[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

133543

 
 

909

 
 

108587

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 108457 Download | Alert*

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the WhoAmI URL. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping the reason a queue item is blocked in tooltips. Successful exploitation could allow attackers to control the reason a queue item is blocked.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping tag name on a tooltip. Successful exploitation could allow attackers to control SCM tag names.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:combobox form controls. Successful exploitation could allow attackers to control the contents of form controls.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:expandableTextBox form controls. Successful exploitation could allow attackers to control the contents of form controls.

The host is installed with LibreOffice 6.2.x before 6.2.7 or 6.3.x before 6.3.1 and is prone to an insufficient URL decoding vulnerability. A flaw is present in the application, which fails to properly handle the macro location categorization. Successful exploitation could allow attackers to perform arbitrary macro execution.

The host is installed with LibreOffice 6.2.x before 6.2.7 or 6.3.x before 6.3.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle an unknown functionality of the file share/Scripts/python of the component URL Encoding. Successful exploitation could allow attackers to execute scripts in arbitrary locations on the file system by ...

Mozilla Thunderbird 68.1 : Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation could allow attackers to bypass permission checks and possibly obtain sensitive information.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in usage of CSRF tokens. Successful exploitation could allow attackers to bypass CSRF protection.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   10845

© SecPod Technologies