Looking for the vulnerability index of Invicti's legacy products?
v.130426185443

Medium Severity Vulnerabilities

Found 15376 vulnerabilities at Medium severity.

Reference
Title
Technology
Atlassian Jira Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability
Atlassian Jira Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Jira Improper Control of Generation of Code (Code Injection) Vulnerability
Atlassian Jira Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Jira Other Vulnerability
Atlassian Jira Other Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Incorrect Authorization Vulnerability
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability
Atlassian Jira Improper Authentication Vulnerability
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability
Atlassian Jira Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Atlassian Jira Incorrect Authorization Vulnerability
Rest API Endpoint Leaked Project Categories Project categories status categories issue link types priorities and resolutions to Unauthorised users
A user can view the createmeta information of private projects
Sqlite Missing Release of Memory after Effective Lifetime Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Vulnerability
Sqlite Out-of-bounds Write Vulnerability
Sqlite Integer Overflow or Wraparound Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Improper Handling of Exceptional Conditions Vulnerability
Sqlite Uncontrolled Recursion Vulnerability
Sqlite Use After Free Vulnerability
Sqlite Divide By Zero Vulnerability
Sqlite NULL Pointer Dereference Vulnerability
Sqlite Improper Input Validation Vulnerability
Sqlite Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability