🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Medium Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Medium Severity Vulnerabilities
Found
8734 vulnerabilities
at
Medium
severity.
Vulnerability Name
CVE
CWE
Severity
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-2531)
CVE-2010-2531
CWE-200
Medium
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-2787)
CVE-2010-2787
CWE-200
Medium
Apache HTTP Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-2791)
CVE-2010-2791
CWE-200
Medium
OpenSSL Resource Management Errors Vulnerability (CVE-2010-2939)
CVE-2010-2939
-
Medium
PHP Use of Externally-Controlled Format String Vulnerability (CVE-2010-2950)
CVE-2010-2950
CWE-134
Medium
Squid Other Vulnerability (CVE-2010-2951)
CVE-2010-2951
-
Medium
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2010-2952)
CVE-2010-2952
CWE-20
Medium
phpMyAdmin Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-2958)
CVE-2010-2958
CWE-707
Medium
phpMyAdmin Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3056)
CVE-2010-3056
CWE-707
Medium
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-3062)
CVE-2010-3062
CWE-200
Medium
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2010-3063)
CVE-2010-3063
CWE-119
Medium
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2010-3064)
CVE-2010-3064
CWE-119
Medium
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3065)
CVE-2010-3065
CWE-264
Medium
Squid Other Vulnerability (CVE-2010-3072)
CVE-2010-3072
-
Medium
Django Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3082)
CVE-2010-3082
CWE-707
Medium
Drupal Improper Authentication Vulnerability (CVE-2010-3091)
CVE-2010-3091
CWE-287
Medium
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3092)
CVE-2010-3092
CWE-264
Medium
Zope Web Application Server Other Vulnerability (CVE-2010-3198)
CVE-2010-3198
-
Medium
phpMyAdmin Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3263)
CVE-2010-3263
CWE-707
Medium
Ruby on Rails Missing Encryption of Sensitive Data Vulnerability (CVE-2010-3299)
CVE-2010-3299
CWE-311
Medium
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3433)
CVE-2010-3433
CWE-264
Medium
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3436)
CVE-2010-3436
CWE-264
Medium
Python Other Vulnerability (CVE-2010-3492)
CVE-2010-3492
-
Medium
Python Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2010-3493)
CVE-2010-3493
CWE-362
Medium
Oracle Database Server CVE-2010-3590 Vulnerability (CVE-2010-3590)
CVE-2010-3590
-
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3659)
CVE-2010-3659
CWE-707
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3660)
CVE-2010-3660
CWE-707
Medium
TYPO3 URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2010-3661)
CVE-2010-3661
CWE-601
Medium
TYPO3 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-3664)
CVE-2010-3664
CWE-200
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3665)
CVE-2010-3665
CWE-707
Medium
TYPO3 Use of Insufficiently Random Values Vulnerability (CVE-2010-3666)
CVE-2010-3666
CWE-330
Medium
TYPO3 Improper Input Validation Vulnerability (CVE-2010-3667)
CVE-2010-3667
CWE-20
Medium
TYPO3 URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2010-3669)
CVE-2010-3669
CWE-601
Medium
TYPO3 Inadequate Encryption Strength Vulnerability (CVE-2010-3670)
CVE-2010-3670
CWE-326
Medium
TYPO3 Session Fixation Vulnerability (CVE-2010-3671)
CVE-2010-3671
CWE-384
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3672)
CVE-2010-3672
CWE-707
Medium
TYPO3 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-3673)
CVE-2010-3673
CWE-200
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3674)
CVE-2010-3674
CWE-707
Medium
MySQL Other Vulnerability (CVE-2010-3676)
CVE-2010-3676
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3677)
CVE-2010-3677
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3678)
CVE-2010-3678
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3679)
CVE-2010-3679
-
Medium
MySQL Other Vulnerability (CVE-2010-3680)
CVE-2010-3680
-
Medium
MySQL Other Vulnerability (CVE-2010-3681)
CVE-2010-3681
-
Medium
MySQL Other Vulnerability (CVE-2010-3682)
CVE-2010-3682
-
Medium
MySQL Other Vulnerability (CVE-2010-3683)
CVE-2010-3683
-
Medium
Drupal Improper Authentication Vulnerability (CVE-2010-3685)
CVE-2010-3685
CWE-287
Medium
Drupal Improper Authentication Vulnerability (CVE-2010-3686)
CVE-2010-3686
CWE-287
Medium
PHP Improper Input Validation Vulnerability (CVE-2010-3709)
CVE-2010-3709
CWE-20
Medium
PHP Resource Management Errors Vulnerability (CVE-2010-3710)
CVE-2010-3710
-
Medium
Joomla Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3712)
CVE-2010-3712
CWE-707
Medium
TYPO3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-3715)
CVE-2010-3715
CWE-707
Medium
TYPO3 Improper Input Validation Vulnerability (CVE-2010-3716)
CVE-2010-3716
CWE-20
Medium
TYPO3 Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3717)
CVE-2010-3717
CWE-264
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3833)
CVE-2010-3833
-
Medium
MySQL CVE-2010-3834 Vulnerability (CVE-2010-3834)
CVE-2010-3834
-
Medium
MySQL Numeric Errors Vulnerability (CVE-2010-3835)
CVE-2010-3835
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3836)
CVE-2010-3836
-
Medium
MySQL Resource Management Errors Vulnerability (CVE-2010-3837)
CVE-2010-3837
-
Medium
MySQL Other Vulnerability (CVE-2010-3838)
CVE-2010-3838
-
Medium
MySQL Other Vulnerability (CVE-2010-3839)
CVE-2010-3839
-
Medium
MySQL Other Vulnerability (CVE-2010-3840)
CVE-2010-3840
-
Medium
PHP Improper Input Validation Vulnerability (CVE-2010-3870)
CVE-2010-3870
CWE-20
Medium
Jboss EAP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2010-3878)
CVE-2010-3878
CWE-352
Medium
Ruby on Rails Improper Input Validation Vulnerability (CVE-2010-3933)
CVE-2010-3933
CWE-20
Medium
PostgreSQL Numeric Errors Vulnerability (CVE-2010-4015)
CVE-2010-4015
-
Medium
TYPO3 Improper Input Validation Vulnerability (CVE-2010-4068)
CVE-2010-4068
CWE-20
Medium
PHP Resource Management Errors Vulnerability (CVE-2010-4150)
CVE-2010-4150
-
Medium
Apache Tomcat Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-4172)
CVE-2010-4172
CWE-707
Medium
Nginx CVE-2010-4180 Vulnerability (CVE-2010-4180)
CVE-2010-4180
-
Medium
OpenSSL Other Vulnerability (CVE-2010-4180)
CVE-2010-4180
-
Medium
YUI Library Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-4207)
CVE-2010-4207
CWE-707
Medium
YUI Library Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-4208)
CVE-2010-4208
CWE-707
Medium
YUI Library Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2010-4209)
CVE-2010-4209
CWE-707
Medium
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-4257)
CVE-2010-4257
CWE-138
Medium
« Previous
1
...
20
21
22
23
24
25
26
27
...
117
Next »