[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26087 Download | Alert*

The host is installed with Calibre before 6.19.0 and is prone to a server-side request forgery vulnerability. A flaw is present in the application, which fails to handle issues in link_to_local_path in ebooks/conversion/plugins/html_input.py. Successful exploitation allows an attacker to have unspecified impact.

The host is installed with Jenkins LTS before 2.414.3 or Jenkins rolling release before 2.428 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could lead to denial of service.

The host is installed with Jenkins LTS before 2.375.4 or Jenkins rolling release before 2.394 is prone to an incorrect authorization vulnerability. The flaw is present in the application, which fails to properly handle file permissions. Successful exploitation could allow unauthenticated attackers with access to the Jenkins controller file system to read and write the file before it is used.

The host is installed with Jenkins rolling release 2.367 through 2.369 is prone to a cross-site scripting vulnerability. The flaw is present in the application, which fails to properly handle tooltips of the l:helpIcon UI component used for some help icons. Successful exploitation could allow attackers to control tooltips for this component.

The host is installed with Jenkins LTS before 2.361.1 or Jenkins rolling release before 2.363 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could allow unauthenticated attackers to make the Jenkins UI unresponsive by exploiting Jetty's handling of invalid HTTP/2 requests, causing a denial ...

The host is installed with Jenkins LTS before 2.277.3 or Jenkins rolling release before 2.286 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could allow unauthenticated attackers to cause a denial of service if Winstone-Jetty is configured to handle SSL/TLS connections.

The host is installed with Jenkins LTS before 2.138.2 or Jenkins rolling release before 2.146 is prone to an information exposure vulnerability. The flaw is present in the application, which fails to properly handle an issue in Stapler framework. Successful exploitation could result in secrets being displayed or written to logs.

The host is installed with Foxit PDF Reader through 2023.3.0.23028, or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.8.53842, 12.x through 12.1.4.15400, 13.x through 13.0.1.21693, 2023.x 2023.3.0.23028 and is prone to a local privilege escalation vulnerability. A flaw is present in the applications which fails to properly handle an issue in the permissions on the folder in which the up ...

The host is installed with Apache HTTP Server before 2.4.58 and is prone to an out of memory vulnerability. A flaw is present in the application, which fails to properly handle a RST frame. Successful exploitation allows attackers to cause out of memory.

The host is installed with Google Chrome before 124.0.6367.78 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2608

© SecPod Technologies