[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255716

 
 

909

 
 

198991

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16276 Download | Alert*

The host is installed with Node.js 14.13.0 before 14.15.1 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle DNS request. Successful exploitation allows attackers to cause denial of service.

The host is installed with Node.js 14.0.0 before 14.9.0 and is buffer overflow vulnerability. A flaw is present in the application which fails to handle realpath in libuv. Successful exploitation allows an attacker to cause buffer overflow if the resolved path is longer than 256 bytes.

The host is installed with Node.js 14.0.0 before 14.11.0 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle delayed requests submission. Successful exploitation allows attackers to cause denial of service.

The host is installed with Node.js 14.0.0 before 14.11.0 and is prone to a HTTP request smuggling vulnerability. A flaw is present in the application which fails to handle malicious payloads. Successful exploitation allows an attacker to hijack user sessions, poison cookies, perform clickjacking and a multitude of other attacks depending on the architecture of the underlying system.

The host is installed with Node.js 14.0.0 before 14.4.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to handle napi_get_value_string_*(). Successful exploitation allows various kinds of memory corruption.

The host is installed with Node.js 14.0.0 before 14.4.0 and is prone to an improper certificate validation vulnerability. A flaw is present in the application which fails to handle reused TLS session. Successful exploitation allows an attacker to perform host certificate verification bypass.

The host is installed with Pidgin before 2.14.9 and is prone to a DNS spoofing vulnerability. A flaw is present in the application, which fails to validate the TLS certificate. On successful exploitation, the client can perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection a ...

The host is installed with Jenkins rolling release 2.335 through 2.355 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an unauthorized view fragment access issue. Successful exploitation could allow attackers to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information.

The host is installed with Jenkins LTS through 2.332.3 or Jenkins rolling release through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an observable timing discrepancy on the login form issue. Successful exploitation could allow attackers to distinguish between login attempts with an invalid username, and login attempts wit ...

The host is installed with Jenkins rolling release 2.340 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the tooltip of the build button. Successful exploitation could allow attackers with Job/Configure permission to support HTML without escaping the job display name, resulting in a cross-site scripting (XS ...


Pages:      Start    730    731    732    733    734    735    736    737    738    739    740    741    742    743    ..   1627

© SecPod Technologies