Low Severity Vulnerabilities

Found 821 vulnerabilities at Low severity.

Reference
Title
Technology
Python Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Python Permissions Privileges and Access Controls Vulnerability
Python Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Python Other Vulnerability
Perl Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Ember.js Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Ruby on Rails 7PK - Security Features Vulnerability
Django Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Django Permissions Privileges and Access Controls Vulnerability
Opencart Cross-Site Request Forgery (CSRF) Vulnerability
Lighttpd Cryptographic Issues Vulnerability
Lighttpd Other Vulnerability
PostgreSQL Out-of-bounds Read Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Other Vulnerability
PostgreSQL Numeric Errors Vulnerability
PostgreSQL Vulnerability
PostgreSQL Insufficient Verification of Data Authenticity Vulnerability
Claroline Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
ZenCart Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Serendipity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Serendipity Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dotclear Permissions Privileges and Access Controls Vulnerability
Dotclear Other Vulnerability
Vanilla Forums Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Vanilla Forums Permissions Privileges and Access Controls Vulnerability
MyBB Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
MyBB Permissions Privileges and Access Controls Vulnerability