Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15365 vulnerabilities at Medium severity.

Reference
Title
Technology
PHP Resource Management Errors Vulnerability
PHP Numeric Errors Vulnerability
PHP Numeric Errors Vulnerability
PHP Permissions Privileges and Access Controls Vulnerability
PHP Resource Management Errors Vulnerability
PHP Use of Externally-Controlled Format String Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Permissions Privileges and Access Controls Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Use of Externally-Controlled Format String Vulnerability
PHP Resource Management Errors Vulnerability
PHP Resource Management Errors Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Resource Management Errors Vulnerability
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
PHP Permissions Privileges and Access Controls Vulnerability
PHP Cryptographic Issues Vulnerability
PHP Other Vulnerability
PHP Numeric Errors Vulnerability
PHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability