[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15153 Download | Alert*

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid agent names. Successful exploitation allows attackers allows attackers to cause Jenkins to start up with unsafe legacy defaults after a restart.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an untrusted data deserialisation vulnerability. A flaw is present in the application, which fails to properly handle REST API XML deserialization errors. Successful exploitation allows attackers allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an untrusted data deserialisation vulnerability. A flaw is present in the application, which fails to properly handle REST API XML deserialization errors. Successful exploitation allows attackers allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the notification bar. Successful exploitation allows attackers to influence notification bar contents.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the notification bar. Successful exploitation allows attackers to influence notification bar contents.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...

The host is installed with Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13 or 2.1.0 through 2.1.3 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.

The host is installed with Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13 or 2.1.0 through 2.1.3 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.

The host is installed with Apache Cassandra 3.8 through 3.11.1 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.


Pages:      Start    635    636    637    638    639    640    641    642    643    644    645    646    647    648    ..   1515

© SecPod Technologies