Medium Severity Vulnerabilities

Found 14663 vulnerabilities at Medium severity.

Reference
Title
Technology
reveal.js Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
reveal.js Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
WordPress Plugin Leaflet id Parameter Cross-Site Scripting
CakePHP Cross-Site Request Forgery (CSRF) Vulnerability
CakePHP Permissions Privileges and Access Controls Vulnerability
CakePHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
CakePHP Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
CakePHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution URL Redirection to Untrusted Site (Open Redirect) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Cross-Site Request Forgery (CSRF) Vulnerability
b2evolution Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
b2evolution Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Other Vulnerability
CherryPy Other Vulnerability
Dolphin Cross-Site Request Forgery (CSRF) Vulnerability
Dolphin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolphin Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dolphin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Dolphin Other Vulnerability
Dolphin Other Vulnerability
Dolphin Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability