Looking for the vulnerability index of Invicti's legacy products?
v.170326144420

Low Severity Vulnerabilities

Found 848 vulnerabilities at Low severity.

Reference
Title
Technology
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Other Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Other Vulnerability
WordPress Authentication Bypass Using an Alternate Path or Channel Vulnerability
WordPress 2.9.1 Trashed Posts Security Bypass Vulnerability
Joomla Vulnerability
Joomla Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Joomla Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Joomla Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Joomla Core 3.0.x Clickjacking Vulnerability
Joomla Core 2.5.x Clickjacking Vulnerability
Joomla Core 3.x.x Security Bypass
Joomla Core 3.x.x Security Bypass
Joomla Core 3.x.x Security Bypass
Joomla Core 3.x.x Security Bypass
Drupal Improper Access Control Vulnerability
Drupal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Drupal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Drupal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Drupal Permissions Privileges and Access Controls Vulnerability
Drupal Permissions Privileges and Access Controls Vulnerability