[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31160 Download | Alert*

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access issue. Successful exploitation could allow attackers to create parent directories in FilePath#mkdirs without checking the permission.

The host is installed with LibreOffice 7.2.x before 7.2.5 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle digital signatures of ODF documents. Successful exploitation allows attackers to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the do ...

The host is installed with Jenkins rolling release 2.335 through 2.355 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an unauthorized view fragment access issue. Successful exploitation could allow attackers to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information.

The host is installed with Jenkins LTS through 2.332.3 or Jenkins rolling release through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an observable timing discrepancy on the login form issue. Successful exploitation could allow attackers to distinguish between login attempts with an invalid username, and login attempts wit ...

The host is installed with Jenkins rolling release 2.340 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the tooltip of the build button. Successful exploitation could allow attackers with Job/Configure permission to support HTML without escaping the job display name, resulting in a cross-site scripting (XS ...

The host is installed with Jenkins rolling release 2.340 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the symbol-based icons. Successful exploitation could allow attackers to unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability.

The host is installed with Jenkins LTS 2.332.1 through 2.332.3 or Jenkins rolling release 2.321 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the help icon as it does not escape the feature name that is part of its tooltip. Successful exploitation could allow attackers with Job/Configure permission to exp ...

The host is installed with Jenkins LTS 2.332.1 through 2.332.3 or Jenkins rolling release 2.320 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the help icon as it does not escape the feature name that is part of its tooltip. Successful exploitation could allow attackers with Job/Configure permission to exp ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...


Pages:      Start    1504    1505    1506    1507    1508    1509    1510    1511    1512    1513    1514    1515    1516    1517    ..   3115

© SecPod Technologies