Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15365 vulnerabilities at Medium severity.

Reference
Title
Technology
Apache HTTP Server Interpretation Conflict Vulnerability
Apache HTTP Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Apache HTTP Server Uncontrolled Resource Consumption Vulnerability
Apache HTTP Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Apache HTTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Apache HTTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Apache HTTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Apache HTTP Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Apache HTTP Server Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Apache HTTP Server Other Vulnerability
Apache HTTP Server Vulnerability
Apache HTTP Server Configuration Vulnerability
Apache HTTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Apache HTTP Server Vulnerability
Apache HTTP Server Incorrect Check of Function Return Value Vulnerability
Apache HTTP Server Vulnerability
Apache HTTP Server Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting) Vulnerability
Apache HTTP Server Authentication Bypass Using an Alternate Path or Channel Vulnerability
Apache HTTP Server Improper Neutralization of Escape Meta or Control Sequences Vulnerability
PHP Reliance on Cookies without Validation and Integrity Checking Vulnerability
PHP Inadequate Encryption Strength Vulnerability
PHP Integer Overflow or Wraparound Vulnerability
PHP Other Vulnerability
PHP Out-of-bounds Read Vulnerability
PHP Improper Preservation of Permissions Vulnerability
PHP Out-of-bounds Read Vulnerability
PHP Use of Uninitialized Resource Vulnerability
PHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
PHP Out-of-bounds Read Vulnerability
PHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability