🚀 Just released:
Latio 2026 Application Security Market Report.
Read it in our Whitepapers.
100% Signal 0% Noise
Platform
Invicti Platform
Zero-noise AppSec platform
Scan Code
Secure code before runtime
SAST
Early static security analysis
Open Source (SCA)
Find vulnerable dependencies
SBOM & License Risk
Generate SBOMs and track licenses
Secrets
Detect exposed secrets in applications
Infrastructure as Code
Ingest IaC security findings
Container
Track container image vulnerabilities
Test Runtime
Test live applications like attackers
DAST & AI DAST
Test runtime, prove exploitability
Agentic Pentesting
Automate real-world attack techniques
API Security Testing
Discover and test APIs
Attack Surface Management
Identify exposed apps and endpoints
Cloud AppSec
Get a single-pane view of cloud app risk
AI AppSec
Scan smarter, accelerate remediation
Manage Vulnerabilities
See, prioritize, reduce AppSec risk
Vulnerability Management (ASPM)
Centralize and correlate AppSec findings
Compliance & Executive Reporting
Measure risk and impact
Threat Intelligence
Reachability, exploitability, and business logic
Solutions
API Discovery
Manage Vulnerabilities
Automate Security Workflows
Track AppSec KPIs
Manage Open Source Risk
Pricing
Why Invicti
About Us
Case Studies
Contact Us
Careers
Resources
Resource Library
Blog
Webinars
White Papers
Podcasts
Invicti Learn
Savings Calculator
Live Training
Partners
Documentation
Get a demo
Home
/
Web Application Vulnerabilities
/ Medium Severity
Web Application Vulnerabilities
Runtime SCA Findings
Looking for the vulnerability index of Invicti's legacy products?
Invicti Enterprise
Acunetix Standard & Premium
v.26.4.2314
Medium Severity Vulnerabilities
Found
8734 vulnerabilities
at
Medium
severity.
Vulnerability Name
CVE
CWE
Severity
qdPM Sensitive Information Disclosure Vulnerability (CVE-2015-3882)
CVE-2015-3882
-
Medium
qdPM Multiple Cross-site Scripting (XSS) Vulnerabilities (CVE-2015-3883)
CVE-2015-3883
-
Medium
Ruby 7PK - Security Features Vulnerability (CVE-2015-3900)
CVE-2015-3900
-
Medium
RubyGems 7PK - Security Features Vulnerability (CVE-2015-3900)
CVE-2015-3900
-
Medium
phpMyAdmin Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-3902)
CVE-2015-3902
CWE-352
Medium
phpMyAdmin Cryptographic Issues Vulnerability (CVE-2015-3903)
CVE-2015-3903
-
Medium
Coppermine Open Redirection Vulnerability (CVE-2015-3922)
CVE-2015-3922
-
Medium
Coppermine Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-3923)
CVE-2015-3923
CWE-200
Medium
Dolibarr Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-3935)
CVE-2015-3935
CWE-707
Medium
Django Other Vulnerability (CVE-2015-3982)
CVE-2015-3982
-
Medium
concrete5 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-3989)
CVE-2015-3989
CWE-707
Medium
RubyGems Improper Input Validation Vulnerability (CVE-2015-4020)
CVE-2015-4020
CWE-20
Medium
PHP Numeric Errors Vulnerability (CVE-2015-4021)
CVE-2015-4021
-
Medium
PHP Resource Management Errors Vulnerability (CVE-2015-4024)
CVE-2015-4024
-
Medium
PHP Improper Input Validation Vulnerability (CVE-2015-4148)
CVE-2015-4148
CWE-20
Medium
MyBB Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4552)
CVE-2015-4552
CWE-707
Medium
PHP Improper Input Validation Vulnerability (CVE-2015-4598)
CVE-2015-4598
CWE-20
Medium
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4628)
CVE-2015-4628
CWE-138
Medium
Opencart Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4671)
CVE-2015-4671
CWE-707
Medium
ClipBucket Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4673)
CVE-2015-4673
CWE-707
Medium
ownCloud Files or Directories Accessible to External Parties Vulnerability (CVE-2015-4715)
CVE-2015-4715
CWE-552
Medium
concrete5 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-4721)
CVE-2015-4721
CWE-707
Medium
MySQL CVE-2015-4730 Vulnerability (CVE-2015-4730)
CVE-2015-4730
-
Medium
Oracle Database Server CVE-2015-4740 Vulnerability (CVE-2015-4740)
CVE-2015-4740
-
Medium
MySQL CVE-2015-4752 Vulnerability (CVE-2015-4752)
CVE-2015-4752
-
Medium
Oracle Database Server CVE-2015-4755 Vulnerability (CVE-2015-4755)
CVE-2015-4755
-
Medium
MySQL CVE-2015-4756 Vulnerability (CVE-2015-4756)
CVE-2015-4756
-
Medium
MySQL CVE-2015-4772 Vulnerability (CVE-2015-4772)
CVE-2015-4772
-
Medium
MySQL CVE-2015-4800 Vulnerability (CVE-2015-4800)
CVE-2015-4800
-
Medium
MySQL CVE-2015-4802 Vulnerability (CVE-2015-4802)
CVE-2015-4802
-
Medium
MySQL CVE-2015-4815 Vulnerability (CVE-2015-4815)
CVE-2015-4815
-
Medium
MySQL CVE-2015-4816 Vulnerability (CVE-2015-4816)
CVE-2015-4816
-
Medium
MySQL CVE-2015-4826 Vulnerability (CVE-2015-4826)
CVE-2015-4826
-
Medium
MySQL CVE-2015-4830 Vulnerability (CVE-2015-4830)
CVE-2015-4830
-
Medium
MySQL CVE-2015-4833 Vulnerability (CVE-2015-4833)
CVE-2015-4833
-
Medium
Oracle Database Server CVE-2015-4857 Vulnerability (CVE-2015-4857)
CVE-2015-4857
-
Medium
MySQL CVE-2015-4858 Vulnerability (CVE-2015-4858)
CVE-2015-4858
-
Medium
MySQL CVE-2015-4862 Vulnerability (CVE-2015-4862)
CVE-2015-4862
-
Medium
MySQL CVE-2015-4866 Vulnerability (CVE-2015-4866)
CVE-2015-4866
-
Medium
MySQL CVE-2015-4870 Vulnerability (CVE-2015-4870)
CVE-2015-4870
-
Medium
MySQL CVE-2015-4879 Vulnerability (CVE-2015-4879)
CVE-2015-4879
-
Medium
Oracle Database Server CVE-2015-4888 Vulnerability (CVE-2015-4888)
CVE-2015-4888
-
Medium
Oracle Database Server CVE-2015-4900 Vulnerability (CVE-2015-4900)
CVE-2015-4900
-
Medium
MySQL CVE-2015-4904 Vulnerability (CVE-2015-4904)
CVE-2015-4904
-
Medium
MySQL CVE-2015-4905 Vulnerability (CVE-2015-4905)
CVE-2015-4905
-
Medium
Oracle Database Server CVE-2015-4921 Vulnerability (CVE-2015-4921)
CVE-2015-4921
-
Medium
Oracle Database Server CVE-2015-4923 Vulnerability (CVE-2015-4923)
CVE-2015-4923
-
Medium
Oracle Database Server CVE-2015-4925 Vulnerability (CVE-2015-4925)
CVE-2015-4925
-
Medium
silverstripeCMS Other Vulnerability (CVE-2015-5062)
CVE-2015-5062
-
Medium
silverstripeCMS Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-5063)
CVE-2015-5063
CWE-707
Medium
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-5078)
CVE-2015-5078
CWE-138
Medium
Django Improper Input Validation Vulnerability (CVE-2015-5144)
CVE-2015-5144
CWE-20
Medium
Apache Tomcat Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-5174)
CVE-2015-5174
CWE-22
Medium
Jboss EAP 7PK - Security Features Vulnerability (CVE-2015-5178)
CVE-2015-5178
-
Medium
Jboss EAP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5188)
CVE-2015-5188
CWE-352
Medium
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5220)
CVE-2015-5220
CWE-119
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5264)
CVE-2015-5264
CWE-264
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5265)
CVE-2015-5265
CWE-264
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5266)
CVE-2015-5266
CWE-264
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5268)
CVE-2015-5268
CWE-264
Medium
Moodle Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-5269)
CVE-2015-5269
CWE-707
Medium
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5272)
CVE-2015-5272
CWE-264
Medium
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5288)
CVE-2015-5288
CWE-200
Medium
PostgreSQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5289)
CVE-2015-5289
CWE-119
Medium
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5317)
CVE-2015-5317
CWE-200
Medium
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5318)
CVE-2015-5318
CWE-352
Medium
Jenkins Other Vulnerability (CVE-2015-5319)
CVE-2015-5319
-
Medium
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5320)
CVE-2015-5320
CWE-200
Medium
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5321)
CVE-2015-5321
CWE-200
Medium
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-5322)
CVE-2015-5322
CWE-22
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323)
CVE-2015-5323
CWE-264
Medium
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5324)
CVE-2015-5324
CWE-264
Medium
Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2015-5326)
CVE-2015-5326
CWE-707
Medium
Moodle 7PK - Security Features Vulnerability (CVE-2015-5331)
CVE-2015-5331
-
Medium
Moodle Resource Management Errors Vulnerability (CVE-2015-5332)
CVE-2015-5332
-
Medium
« Previous
1
...
46
47
48
49
50
51
52
53
...
117
Next »