Medium Severity Vulnerabilities

Found 14663 vulnerabilities at Medium severity.

Reference
Title
Technology
Jetty Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Vulnerability
Jetty Improper Neutralization of Quoting Syntax Vulnerability
Jetty Weak Authentication Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Other Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Tornado Observable Differences in Behavior to Error Inputs Vulnerability
Tornado Improper Input Validation Vulnerability
Tornado URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server Improper Neutralization of CRLF Sequences (CRLF Injection) Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
CrushFTP Server Improper Validation of Integrity Check Value Vulnerability
CrushFTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Werkzeug WSGI Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Werkzeug WSGI URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Varnish Cache Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Oracle HTTP Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Oracle HTTP Server Use of a Broken or Risky Cryptographic Algorithm Vulnerability
Oracle HTTP Server Inadequate Encryption Strength Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Oracle HTTP Server Uncontrolled Resource Consumption Vulnerability