Looking for the vulnerability index of Invicti's legacy products?
v.170326144420

Low Severity Vulnerabilities

Found 848 vulnerabilities at Low severity.

Reference
Title
Technology
Oracle JRE Observable Discrepancy Vulnerability
Oracle JRE Insecure Storage of Sensitive Information Vulnerability
Oracle JRE Acceptance of Extraneous Untrusted Data With Trusted Data Vulnerability
Oracle JRE Uncontrolled Resource Consumption Vulnerability
Oracle JRE Improper Access Control Vulnerability
Liferay Portal Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Liferay Portal Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Grafana Improper Preservation of Permissions Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Authorization Bypass Through User-Controlled Key Vulnerability
Grafana Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability
Jetty Improper Link Resolution Before File Access (Link Following) Vulnerability
Jetty Insufficient Session Expiration Vulnerability
Jetty Improper Input Validation Vulnerability
Werkzeug WSGI Vulnerability
Varnish Cache Permissions Privileges and Access Controls Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Other Vulnerability
Oracle HTTP Server Vulnerability