[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16021 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.11.187606 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation leads to arbitrary file system write.

The host is installed with Adobe Photoshop before 22.1.1 and is prone to an heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Jenkins LTS before 2.414.3 or Jenkins rolling release before 2.428 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could lead to denial of service.

The host is installed with Jenkins LTS through 2.387.3 or Jenkins rolling through 2.399 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to handle POST requests. Successful exploitation could allow attackers to trick a user into sending a POST request to an unexpected endpoint by opening a context menu.

The host is installed with Jenkins LTS before 2.375.4 or Jenkins rolling release before 2.394 is prone to an incorrect authorization vulnerability. The flaw is present in the application, which fails to properly handle file permissions. Successful exploitation could allow unauthenticated attackers with access to the Jenkins controller file system to read and write the file before it is used.

The host is installed with Jenkins LTS before 2.361.1 or Jenkins rolling release before 2.363 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could allow unauthenticated attackers to make the Jenkins UI unresponsive by exploiting Jetty's handling of invalid HTTP/2 requests, causing a denial ...

The host is installed with Jenkins LTS before 2.277.3 or Jenkins rolling release before 2.286 is prone to a denial of service vulnerability. The flaw is present in the application, which fails to properly handle bundled Jetty. Successful exploitation could allow unauthenticated attackers to cause a denial of service if Winstone-Jetty is configured to handle SSL/TLS connections.

The host is installed with Jenkins LTS before 2.138.2 or Jenkins rolling release before 2.146 is prone to an information exposure vulnerability. The flaw is present in the application, which fails to properly handle an issue in Stapler framework. Successful exploitation could result in secrets being displayed or written to logs.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 23.008.20533, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30574 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 23.008.20533, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30574 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.


Pages:      Start    6    7    8    9    10    11    12    13    14    15    16    17    18    19    ..   1602

© SecPod Technologies