Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
WordPress Plugin 10Web AI Assistant-AI content writing assistant Security Bypass
WordPress Plugin HTML5 Video Player-Best WordPress Video Player and Block Cross-Site Scripting
WordPress Plugin Country State City Dropdown CF7 Security Bypass
WordPress Plugin NextMove Lite-Thank You Page for WooCommerce Security Bypass
WordPress Plugin NextMove Lite-Thank You Page for WooCommerce Cross-Site Request Forgery
WordPress Plugin InstaWP Connect-1-click WP Staging Migration Security Bypass
WordPress Plugin Swiss Toolkit For WP Security Bypass
WordPress Plugin Unlimited Elements For Elementor (Free Widgets Addons Templates) Cross-Site Scripting
WordPress Plugin SiteGuard WP Information Disclosure
WordPress Plugin OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer) Cross-Site Scripting
WordPress Plugin WPCafe-Online Food Ordering Restaurant Menu Delivery and Reservations for WooCommerce Cross-Site Scripting
WordPress Plugin WPCafe-Online Food Ordering Restaurant Menu Delivery and Reservations for WooCommerce Server-Side Request Forgery
WordPress Plugin WPCafe-Online Food Ordering Restaurant Menu Delivery and Reservations for WooCommerce Security Bypass
WordPress Plugin Advanced File Manager Directory Traversal
WordPress Plugin PowerPack Lite for Beaver Builder Cross-Site Scripting
WordPress Plugin PowerPack Lite for Beaver Builder Cross-Site Scripting
WordPress Plugin PowerPack Lite for Beaver Builder Cross-Site Scripting
WordPress Plugin Cookie Consent for WP-Cookie Consent Consent Log Cookie Scanner Script Blocker (for GDPR CCPA ePrivacy) Security Bypass
WordPress Plugin Cookie Consent for WP-Cookie Consent Consent Log Cookie Scanner Script Blocker (for GDPR CCPA ePrivacy) CSV Injection
WordPress Plugin Brafton Cross-Site Scripting
WordPress Plugin Import XML and RSS Feeds Server-Side Request Forgery
XWiki Transmission of Private Resources into a New Sphere (Resource Leak) Vulnerability
XWiki Incorrect Authorization Vulnerability
XWiki Uncontrolled Resource Consumption Vulnerability
XWiki Incorrect Authorization Vulnerability
XWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
XWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
XWiki Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
XWiki Improper Handling of Exceptional Conditions Vulnerability