Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Cryptographic Issues Vulnerability
Jenkins Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability