[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping upstream job's display name shown as part of a build cause. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping job name in the 'Keep this build forever' badge tooltip. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping job name in the 'Keep this build forever' badge tooltip. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping 'href' attribute of links to downstream jobs displayed in the build console page. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping 'href' attribute of links to downstream jobs displayed in the build console page. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Apache Log4j 2.0.x through 2.15.0 (excluding security releases 2.3.1, 2.12.2 and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers with control o ...

The host is installed with Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. Successful exploitation allows remote attackers to execute arbitrary commands.

libfreerdp/codec/interleaved.c in FreeRDP versions

libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer is also used for a realloc return value.

The host is installed with VMware Workstation 15.0 before 15.1.0 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle an issue in the Advanced Linux Sound Architecture (ALSA) backend. Successful exploitation could allow an attacker with normal user privileges to execute code.


Pages:      Start    967    968    969    970    971    972    973    974    975    976    977    978    979    980    ..   1524

© SecPod Technologies