Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
Jenkins Incorrect Authorization Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability
Jenkins Other Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Session Fixation Vulnerability
Jenkins Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability