The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the notification bar. Successful exploitation allows attackers to influence notification bar contents.
The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...
The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...
The host is installed with Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13 or 2.1.0 through 2.1.3 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.
The host is installed with Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13 or 2.1.0 through 2.1.3 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.
The host is installed with Apache Cassandra 3.8 through 3.11.1 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.
The host is installed with Apache Cassandra 3.8 through 3.11.1 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.
The host is installed with Apache Cassandra 2.1.x before 2.1.22, 2.2.x before 2.2.18, 3.0.x before 3.0.22 or 3.11.x before 3.11.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue that leads to manipulation of RMI registry. Successful exploitation allows attacker to perform a man-in-the-middle attack and capture u ...
The host is installed with Apache Cassandra 2.1.x before 2.1.22, 2.2.x before 2.2.18, 3.0.x before 3.0.22 or 3.11.x before 3.11.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue that leads to manipulation of RMI registry. Successful exploitation allows attacker to perform a man-in-the-middle attack and capture u ...
The host is installed with Opera before 12.01 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which ignores some characters in HTML documents in unspecified circumstances. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.