[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:65169
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping remote address of the host starting a build via 'Trigger builds remotely ...

oval:org.secpod.oval:def:65170
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an escaping agent name in the build time trend page. Successful exploitation coul ...

oval:org.secpod.oval:def:1801802
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons. Tooltip values can be contributed by plugins, some of which use user-specified values.Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description that ...

oval:org.secpod.oval:def:65151
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping remote address of the host starting a build via 'Trigger builds remotely ...

oval:org.secpod.oval:def:65154
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping remote address of the host starting a build via 'Trigger builds remotely ...

CPE    2
cpe:/a:jenkins:jenkins:::~~lts~~~
cpe:/a:jenkins:jenkins:::~~-~~~
CWE    1
CWE-79
*CVE
CVE-2020-2231

© SecPod Technologies