Medium Severity Vulnerabilities
Found 14663 vulnerabilities at Medium severity.
Reference
Title
Technology
reveal.js Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
reveal.js Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
CakePHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
CakePHP Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
CakePHP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution URL Redirection to Untrusted Site (Open Redirect) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
b2evolution Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
b2evolution Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
b2evolution Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dolphin Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Dolphin Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Dolphin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Dolphin Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability