Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
Jenkins Incorrect Authorization Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Inadequate Encryption Strength Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Vulnerability
Jenkins Incorrect Permission Assignment for Critical Resource Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Server-Side Request Forgery (SSRF) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Certificate Validation Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability