[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:65173
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the tooltip content of help icons. Successful exploitation could allow a ...

oval:org.secpod.oval:def:65174
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the tooltip content of help icons. Successful exploitation could allow a ...

oval:org.secpod.oval:def:1801802
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons. Tooltip values can be contributed by plugins, some of which use user-specified values.Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description that ...

oval:org.secpod.oval:def:65153
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the tooltip content of help icons. Successful exploitation could allow a ...

oval:org.secpod.oval:def:65156
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the tooltip content of help icons. Successful exploitation could allow a ...

CPE    2
cpe:/a:jenkins:jenkins:::~~lts~~~
cpe:/a:jenkins:jenkins:::~~-~~~
CWE    1
CWE-79
*CVE
CVE-2020-2229

© SecPod Technologies