[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15266 Download | Alert*

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping tag name on a tooltip. Successful exploitation could allow attackers to control SCM tag names.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping tag name on a tooltip. Successful exploitation could allow attackers to control SCM tag names.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:combobox form controls. Successful exploitation could allow attackers to control the contents of form controls.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:combobox form controls. Successful exploitation could allow attackers to control the contents of form controls.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:expandableTextBox form controls. Successful exploitation could allow attackers to control the contents of form controls.

The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:expandableTextBox form controls. Successful exploitation could allow attackers to control the contents of form controls.

In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.

The host is installed with Jenkins LTS through 2.176.2 or Jenkins rolling release through 2.191 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle CSRF tokens without an associated web session ID. Successful exploitation could allow attackers to bypass CSRF protection for anonymous users.

The host is installed with Jenkins LTS through 2.176.2 or Jenkins rolling release through 2.191 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle CSRF tokens without an associated web session ID. Successful exploitation could allow attackers to bypass CSRF protection for anonymous users.

The host is installed with Jenkins LTS through 2.176.2 or Jenkins rolling release through 2.191 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in update site URL. Successful exploitation could allow attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScrip ...


Pages:      Start    666    667    668    669    670    671    672    673    674    675    676    677    678    679    ..   1526

© SecPod Technologies