[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

The host is installed with Jenkins LTS through 2.150.1 or Jenkins rolling release through 2.158 and is prone to an improper authorization vulnerability. The flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java. Successful exploitation could attackers to extend the duration of active http sessions inde ...

The host is installed with Jenkins LTS through 2.150.1 or Jenkins rolling release through 2.158 and is prone to an improper authorization vulnerability. The flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java. Successful exploitation could attackers to extend the duration of active http sessions inde ...

The host is installed with Jenkins LTS through 2.150.1 or Jenkins rolling release through 2.158 and is prone to an improper authorization vulnerability. The flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java. Successful exploitation could attackers with overall/runscripts permission to craft remember ...

The host is installed with Jenkins LTS through 2.150.1 or Jenkins rolling release through 2.158 and is prone to an improper authorization vulnerability. The flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java. Successful exploitation could attackers with overall/runscripts permission to craft remember ...

In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely.

The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure small windows. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files via a small window for the download dialog.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure small windows. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files via a small window for the download dialog.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure that a dialog window is placed on top of content windows. Successful exploitation allows remote attackers to trick users into downloading and executing arbitrary files via a download dialog located under other windows.

The host is installed with Opera Browser before 11.62 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to ensure that a dialog window is placed on top of content windows. Successful exploitation allows remote attackers to trick users into downloading and executing arbitrary files via a download dialog located under other windows.


Pages:      Start    680    681    682    683    684    685    686    687    688    689    690    691    692    693    ..   1524

© SecPod Technologies