Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15376 vulnerabilities at Medium severity.

Reference
Title
Technology
WebLogic Vulnerability
WebLogic Vulnerability
WebLogic Other Vulnerability
WebLogic Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WebLogic Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WebLogic Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WebLogic Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WebLogic Vulnerability
WebLogic Vulnerability
WebLogic Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
WebLogic Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) Vulnerability
WebLogic Vulnerability
WebLogic Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WebLogic Uncontrolled Resource Consumption Vulnerability
WebLogic Improper Neutralization of Special Elements used in an Expression Language Statement (Expression La Vulnerability
WebLogic Improper Authorization Vulnerability
WebLogic Improper Access Control Vulnerability
WebLogic Improper Privilege Management Vulnerability
WebLogic Uncontrolled Resource Consumption Vulnerability
WebLogic Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Internet Information Services Permissions Privileges and Access Controls Vulnerability
Internet Information Services Other Vulnerability
Internet Information Services Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Internet Information Services Improper Input Validation Vulnerability
Internet Information Services Vulnerability
Internet Information Services Uncontrolled Resource Consumption Vulnerability
Internet Information Services Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Internet Information Services Configuration Vulnerability
Internet Information Services Other Vulnerability
Internet Information Services Other Vulnerability