Low Severity Vulnerabilities

Found 821 vulnerabilities at Low severity.

Reference
Title
Technology
PHP Improper Link Resolution Before File Access (Link Following) Vulnerability
PHP Other Vulnerability
PHP Interpretation Conflict Vulnerability
OpenSSL Inadequate Encryption Strength Vulnerability
OpenSSL Missing Encryption of Sensitive Data Vulnerability
OpenSSL Improper Certificate Validation Vulnerability
OpenSSL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
OpenSSL Improper Input Validation Vulnerability
OpenSSL Cryptographic Issues Vulnerability
OpenSSL Cryptographic Issues Vulnerability
OpenSSL Cryptographic Issues Vulnerability
OpenSSL Improper Authentication Vulnerability
OpenSSL Other Vulnerability
OpenSSL Other Vulnerability
OpenSSL Cryptographic Issues Vulnerability
OpenSSL Cryptographic Issues Vulnerability
OpenSSL Use of a Broken or Risky Cryptographic Algorithm Vulnerability
WordPress Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Permissions Privileges and Access Controls Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability