Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBM RTC Server-Side Request Forgery (SSRF) Vulnerability
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBM RTC Cleartext Storage of Sensitive Information Vulnerability
IBM RTC Exposure of Resource to Wrong Sphere Vulnerability
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBM RTC Exposure of Resource to Wrong Sphere Vulnerability
IBM RTC Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBMHttpServer Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
IBMHttpServer Other Vulnerability
IBMHttpServer Other Vulnerability
IBMHttpServer Other Vulnerability
IBMHttpServer Other Vulnerability
IBMHttpServer Other Vulnerability
IBMHttpServer Other Vulnerability
OpenVPN AS Improper Neutralization of CRLF Sequences (CRLF Injection) Vulnerability
OpenVPN AS Resource Management Errors Vulnerability
OpenVPN AS Cross-Site Request Forgery (CSRF) Vulnerability
OpenVPN AS Cross-Site Request Forgery (CSRF) Vulnerability
OpenVPN AS Other Vulnerability
OpenVPN AS Other Vulnerability
OpenVPN AS Improper Authentication Vulnerability
OpenVPN AS Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Caddy Web Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Caddy Web Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
Caddy Web Server Authentication Bypass by Spoofing Vulnerability
PleskLin Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability