Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15376 vulnerabilities at Medium severity.

Reference
Title
Technology
Jenkins Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Inadequate Encryption Strength Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Authentication Vulnerability
Jenkins Vulnerability
Jenkins Incorrect Permission Assignment for Critical Resource Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability