Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15376 vulnerabilities at Medium severity.

Reference
Title
Technology
Tornado Observable Differences in Behavior to Error Inputs Vulnerability
Tornado Improper Input Validation Vulnerability
Tornado URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Tornado Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Tornado Improper Handling of Invalid Use of Special Elements Vulnerability
Open Resty Inefficient Algorithmic Complexity Vulnerability
CrushFTP Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server Improper Neutralization of CRLF Sequences (CRLF Injection) Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
CrushFTP Server Improper Validation of Integrity Check Value Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
CrushFTP Server Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
CrushFTP Server Server-Side Request Forgery (SSRF) Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Werkzeug WSGI Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Werkzeug WSGI URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Werkzeug WSGI Improper Handling of Windows Device Names Vulnerability
Werkzeug WSGI Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Werkzeug WSGI Improper Handling of Windows Device Names Vulnerability
Werkzeug WSGI Improper Handling of Windows Device Names Vulnerability
Varnish Cache Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Oracle HTTP Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Oracle HTTP Server Use of a Broken or Risky Cryptographic Algorithm Vulnerability
Oracle HTTP Server Inadequate Encryption Strength Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability