[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26032 Download | Alert*

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an untrusted data deserialisation vulnerability. A flaw is present in the application, which fails to properly handle REST API XML deserialization errors. Successful exploitation allows attackers allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the notification bar. Successful exploitation allows attackers to influence notification bar contents.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality and Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality and Integrity.


Pages:      Start    1241    1242    1243    1244    1245    1246    1247    1248    1249    1250    1251    1252    1253    1254    ..   2603

© SecPod Technologies