Medium Severity Vulnerabilities

Found 14663 vulnerabilities at Medium severity.

Reference
Title
Technology
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Server-Side Request Forgery (SSRF) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Certificate Validation Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability