[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31160 Download | Alert*

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to leak memory and cause denial of service.

The host is installed with Wireshark 1.8.x before 1.8.2 and is prone to array index error vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Jenkins LTS through 2.263.2 or Jenkins rolling release through 2.275 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an time-of-check to time-of-use (TOCTOU) race condition issue in workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to contro ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in New Item page. Successful exploitation allows attackers to perform stored XSS attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a reflected XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in markup formatter preview. Successful exploitation allows attackers to perform reflected XSS attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle missing permission check for paths. Successful exploitation allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scripting attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle excessive memory allocation in graph URLs. Successful exploitation allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available m ...


Pages:      Start    1510    1511    1512    1513    1514    1515    1516    1517    1518    1519    1520    1521    1522    1523    ..   3115

© SecPod Technologies