Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15376 vulnerabilities at Medium severity.

Reference
Title
Technology
Grafana Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Improper Synchronization Vulnerability
Grafana Missing Authorization Vulnerability
Grafana Incorrect Authorization Vulnerability
Grafana Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Grafana Uncontrolled Resource Consumption Vulnerability
Grafana Uncontrolled Resource Consumption Vulnerability
Grafana Out-of-bounds Write Vulnerability
Grafana Improper Authorization Vulnerability
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Vulnerability
Jetty Vulnerability
Jetty Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jetty Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Vulnerability
Jetty Improper Neutralization of Quoting Syntax Vulnerability
Jetty Weak Authentication Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Other Vulnerability
Jetty Allocation of Resources Without Limits or Throttling Vulnerability
Jetty Improper Input Validation Vulnerability