Looking for the vulnerability index of Invicti's legacy products?

Low Severity Vulnerabilities

Found 801 vulnerabilities at Low severity.

Reference
Title
Technology
Drupal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Drupal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Drupal Other Vulnerability
Drupal Other Vulnerability
Drupal Other Vulnerability
Drupal Other Vulnerability
Drupal Session Fixation Vulnerability
Drupal Core 7.x Security Bypass
Drupal Core 5.x Cross-Site Request Forgery
Drupal Core 4.7.x Cross-Site Request Forgery
Drupal Core 5.x HTTP Response Splitting
Drupal Core 4.7.x HTTP Response Splitting
Drupal Core 7.x Cross-Site Request Forgery
Drupal Core 8.x.x Denial of Service
Drupal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
MediaWiki Improper Access Control Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Input Validation Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MediaWiki Other Vulnerability
Python Use After Free Vulnerability
Python Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Python Permissions Privileges and Access Controls Vulnerability