Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
Coppermine Cross-site Scripting (XSS) Vulnerability
Coppermine Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Coppermine Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Coppermine Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Coppermine Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Coppermine Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Coppermine Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Coppermine Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Coppermine Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Coppermine Permissions Privileges and Access Controls Vulnerability
Coppermine Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Coppermine Improper Authentication Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Cross-Site Request Forgery (CSRF) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Zenphoto Improper Control of Generation of Code (Code Injection) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Zenphoto Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Zenphoto Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability