[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255716

 
 

909

 
 

198991

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16276 Download | Alert*

The host is installed with Jenkins rolling release 2.340 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the symbol-based icons. Successful exploitation could allow attackers to unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability.

The host is installed with Jenkins LTS 2.332.1 through 2.332.3 or Jenkins rolling release 2.321 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the help icon as it does not escape the feature name that is part of its tooltip. Successful exploitation could allow attackers with Job/Configure permission to exp ...

The host is installed with Jenkins LTS 2.332.1 through 2.332.3 or Jenkins rolling release 2.320 through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an issue in the help icon as it does not escape the feature name that is part of its tooltip. Successful exploitation could allow attackers with Job/Configure permission to exp ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle the issues in encryption of initialization vector. Successful exploitation could allow attackers to gain access to the user's configuration data.

The host is installed with Zoom Client 5.7.3 before 5.11.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in the auto update process. Successful exploitation allows attackers to gain privileges of the root user.

The host is installed with Zoom Client 5.7.3 before 5.11.5 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in the auto update process. Successful exploitation allows attackers to gain privileges of the root user.

The host is installed with Opera before 12.12 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the profile directory. Successful exploitation could allow local users to obtain sensitive information by reading a cache file, password file, or configuration file or possibly gain privileges by modifying or overwriting a configur ...

The host is installed with Opera before 12.12 and is prone to address bar Spoofing vulnerability. A flaw is present in the application, which fails to properly handle a high rate of HTTP requests. Successful exploitation could allow a remote attacker to spoof the address field via a high rate of HTTP requests.

The host is installed with Opera before 12.12 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory for GIF images. Successful exploitation could allow a remote attacker to determine the existence of arbitrary local files via vectors involving web script in an error page.


Pages:      Start    731    732    733    734    735    736    737    738    739    740    741    742    743    744    ..   1627

© SecPod Technologies