[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

125989

 
 

909

 
 

104883

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 15507 Download | Alert*

A denial of service vulnerability exists when .NET Framework improperly handles objects in heap memory. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in Queue.java. Successful exploitation could allow attackers with overall/read permission to cancel queued builds.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in SlaveComputer.java. Successful exploitation could allow attackers with overall/read permission to initiate agent launches, and abort in-progress agent launches.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted login credentials. Successful exploitation could allow attackers to obtain administrator privileges.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle crafted http requests. Successful exploitation could allow attackers to send crafted http requests returning the contents of any file on the jenkins master file system that the jenk ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in BuildTimelineWidget.java. Successful exploitation could allow attackers with job/configure permission to define javascript that would be executed in another user's brows ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in org/kohsuke/stapler/Stapler.java. Successful exploitation could allow attackers with the ability to control the existence of some urls in jenkins to define javascript th ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Plugin.java. Successful exploitation could allow attackers to determine the date and time when a plugin hpi/jpi file was last extracted, which typically is the date o ...

The host is installed with Cacti version before 1.1.18 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the issue in lib/html.php component. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Cacti version 1.1.17 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the method parameter in spikekill.php. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1550

© SecPod Technologies