
Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Multiple reflective cross-site scripting (XSS) vulnerabilities in NexusPHP before 1.7.33 allow remote attackers to inject arbitrary web script or HTML via the secret parameter in /login.php q parameter in /user-ban-log.php query parameter in /log.php text parameter in /moresmiles.php q parameter in myhr.php or id parameter in /viewrequests.php.


It provides improved features over the built-in Windows Regedit.exe. This is a multi-featured Registry editor and viewer. Free Download Registry Explorer (Total Registry) standalone offline installer for Windows.
