[Forgot Password]
Login  Register Subscribe

24547

 
 

132803

 
 

128153

 
 

909

 
 

105829

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 10478 Download | Alert*

The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation allows an attacker to perform a denial of service attack.

The host is installed with Jenkins LTS through 2.46.1 or Jenkins rolling release through 2.56 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in the login command. Successful exploitation could allow attackers to impersonate any Jenkins user.

The host is installed with Jenkins LTS through 2.121.2 or Jenkins rolling release through 2.137 and is prone to an improper authentication vulnerability. A flaw is present in the application, which fails to properly handle issues in SecurityRealm.java and TokenBasedRememberMeServices2.java. Successful exploitation could allow attackers with a valid cookie to remain logged in even if that feature i ...

The host is installed with Jenkins LTS through 2.164.1 or Jenkins rolling release through 2.171 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in CLI authentication. Successful exploitation could allow attackers to cause unauthorized modifications.

The host is installed with GlobalProtect Agent through 4.1.10 and is prone to a local information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the session tokens. Successful exploitation could allow attackers to obtain sensitive information that may aid in launching further attacks.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to handle a memory consumption issue, which was addressed through improved memory handling. Successful exploitation could allow attackers to cause a denial-of-service.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long variable. Successful exploitation could allow attackers to have unspecified impact.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to stack-based buffer overflow overflow vulnerability. A flaw is present in the application, which fails to properly handle a long flagstr variable in a restriction list response. Successful exploitation could allow attackers have unspecified impact.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted /dev/datum device.. Successful exploitation could allow attackers to have unspecified impact.

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an invalid setting in a :config directive, related to the unpeer option. Successful exploitation could allow attackers to cause a denial of service (daemon crash).


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1047

© SecPod Technologies