Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15365 vulnerabilities at Medium severity.

Reference
Title
Technology
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
PHP Incorrect Conversion between Numeric Types Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP NULL Pointer Dereference Vulnerability
PHP Improper Input Validation Vulnerability
PHP Uncontrolled Resource Consumption Vulnerability
PHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
PHP Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
PHP Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
PHP Improper Access Control Vulnerability
PHP Improper Input Validation Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Improper Input Validation Vulnerability
PHP Numeric Errors Vulnerability
PHP Other Vulnerability
PHP Improper Input Validation Vulnerability
PHP Resource Management Errors Vulnerability
PHP Numeric Errors Vulnerability
PHP Improper Input Validation Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Permissions Privileges and Access Controls Vulnerability
PHP Other Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
PHP Other Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability