[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26189 Download | Alert*

The host is installed with Google Chrome before 124.0.6367.118 or Microsoft Edge before 124.0.2478.80 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.118 or Microsoft Edge before 124.0.2478.80 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Jenkins LTS before 2.414.3 or Jenkins rolling release before 2.428 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could lead to denial of service.

The host is installed with Jenkins LTS before 2.375.4 or Jenkins rolling release before 2.394 is prone to an incorrect authorization vulnerability. The flaw is present in the application, which fails to properly handle file permissions. Successful exploitation could allow unauthenticated attackers with access to the Jenkins controller file system to read and write the file before it is used.

The host is installed with Jenkins rolling release 2.367 through 2.369 is prone to a cross-site scripting vulnerability. The flaw is present in the application, which fails to properly handle tooltips of the l:helpIcon UI component used for some help icons. Successful exploitation could allow attackers to control tooltips for this component.

The host is installed with Jenkins LTS before 2.361.1 or Jenkins rolling release before 2.363 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could allow unauthenticated attackers to make the Jenkins UI unresponsive by exploiting Jetty's handling of invalid HTTP/2 requests, causing a denial ...

The host is installed with Jenkins LTS before 2.277.3 or Jenkins rolling release before 2.286 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could allow unauthenticated attackers to cause a denial of service if Winstone-Jetty is configured to handle SSL/TLS connections.

The host is installed with Jenkins LTS before 2.138.2 or Jenkins rolling release before 2.146 is prone to an information exposure vulnerability. The flaw is present in the application, which fails to properly handle an issue in Stapler framework. Successful exploitation could result in secrets being displayed or written to logs.

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

A potential vulnerability in some AMD processors using frequency scaling may allow an authenticated attacker to execute a timing attack to potentially enable information disclosure.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   2618

© SecPod Technologies