Looking for the vulnerability index of Invicti's legacy products?

Medium Severity Vulnerabilities

Found 14578 vulnerabilities at Medium severity.

Reference
Title
Technology
Grafana Authentication Bypass by Spoofing Vulnerability
Grafana Improper Authentication Vulnerability
Grafana Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Synchronization Vulnerability
Grafana Missing Authorization Vulnerability
Grafana Incorrect Authorization Vulnerability
Jetty Vulnerability
Jetty Vulnerability
Jetty Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Vulnerability
Jetty Improper Neutralization of Quoting Syntax Vulnerability
Jetty Weak Authentication Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Other Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Tornado Observable Differences in Behavior to Error Inputs Vulnerability
Tornado Improper Input Validation Vulnerability
Tornado URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server URL Redirection to Untrusted Site (Open Redirect) Vulnerability
CrushFTP Server Improper Neutralization of CRLF Sequences (CRLF Injection) Vulnerability