Looking for the vulnerability index of Invicti's legacy products?
v.170326144420

Medium Severity Vulnerabilities

Found 15290 vulnerabilities at Medium severity.

Reference
Title
Technology
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Cross-Site Request Forgery (CSRF) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Direct Request (Forced Browsing) Vulnerability
Pega Infinity Direct Request (Forced Browsing) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Stored Cross-site Scripting) Vulnerability
Pega Platform LDAP Injection Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Stored Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Pega Infinity Authorization Bypass Through User-Controlled Key Vulnerability
Pega Infinity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability