[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26581 Download | Alert*

The host is installed with PHP before 5.3.7 and is prone to information disclosure vulnerability. A flaw is present crypt_blowfish function in the application, which fails in proper handling of passwords with 8-bit characters. Successful exploitation allows attackers to obtain the MD5 password hash and other sensitive information.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/model/FileParameterValue.java file. Successful exploitation could allow attackers to cause an arbitrary file write on the Jenkins master when schedul ...

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in usage of CSRF tokens. Successful exploitation could allow attackers to bypass CSRF protection.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation could allow attackers to bypass permission checks and possibly obtain sensitive information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.213 and is prone to a nonce key pair encryption vulnerability. A flaw is present in the application, which fails to properly handle issues in reuse of encryption key parameters. Successful exploitation allow attackers with knowledge of agent names to obtain the connection secrets for those agents, which can ...

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to a network amplification vulnerability. A flaw is present in the application, which fails to properly handle issues in UDP amplification reflection. Successful exploitation allow attackers to cause denial of service.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in constant-time comparison function for validating connection secrets. Successful exploitation allow attackers to use a timing attack to obtain this information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in non-constant time comparison function when validating HMAC. Successful exploitation allow attackers to cause unspecified impact.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in user's detail object in the whoAmI diagnostic page. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an improper Authorization vulnerability. A flaw is present in the application, which fails to properly handle an issues with privileged users having Overall/Read access. Successful exploitation allow attackers to view JVM memory usage chart.


Pages:      Start    1620    1621    1622    1623    1624    1625    1626    1627    1628    1629    1630    1631    1632    1633    ..   2658

© SecPod Technologies