[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26404 Download | Alert*

The host is installed with Visual Studio or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause denial of service attacks.

The host is installed with Oracle VM VirtualBox before 6.1.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Jenkins LTS through 2.319.1 or Jenkins rolling through 2.329 and is prone to a cross-site request forgery(csrf) vulnerability. A flaw is present in the application, which fails to handle POST requests for the HTTP endpoint. Successful exploitation could allow attakers to trigger build of job without parameters when no security realm.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an access control vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to read and write the contents of any build directory stored in Jenkins with very few restrictions throu ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a potection mechanism failure vulnerability. A flaw is present in the application, which fails to handle the agent read/write access to the libs/ directory inside build directories. Successful exploitation could allow attackers in control of agent processes to replace the code of a trust ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an issue in FilePath#listFiles operations. Successful exploitation could allow attackers to list files outside directories that agents are allowed to access when following symbolic links.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle a permissions issue. Successful exploitation could allow attackers to make FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace to not ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access issue. Successful exploitation could allow attackers to check the agent-to-controller access only after creating the temporary files.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an issue in FilePath#renameTo and FilePath#moveAllChildrenTo operations. Successful exploitation could allow attackers to only check 'read' agent-to-controller access permission on the s ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to create symbolic links without the symlink permission.


Pages:      Start    1221    1222    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    1233    1234    ..   2640

© SecPod Technologies