Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Cross-Site Request Forgery (CSRF) Vulnerability
WordPress Improper Input Validation Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Cross-Site Request Forgery (CSRF) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Improper Input Validation Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Improper Control of Generation of Code (Code Injection) Vulnerability
WordPress Cryptographic Issues Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Input Validation Vulnerability
WordPress Configuration Vulnerability
WordPress Configuration Vulnerability
WordPress Improper Authentication Vulnerability
WordPress Improper Link Resolution Before File Access (Link Following) Vulnerability