[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31456 Download | Alert*

The host is installed with Jenkins LTS through 2.121.2 or Jenkins rolling release through 2.137 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in CronTab.java. Successful exploitation could allow attackers with overall/read permission to have a request handling thread enter an infinite loop.

The host is installed with Jenkins LTS through 2.121.2 or Jenkins rolling release through 2.137 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in BasicAuthenticationFilter.java. Successful exploitation could allow attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials.

The host is installed with Jenkins LTS through 2.121.2 or Jenkins rolling release through 2.137 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in XStream2.java. Successful exploitation could allow attackers to have jenkins resolve a domain name when deserializing an instance of java.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in org/kohsuke/stapler/Stapler.java. Successful exploitation could allow attackers with the ability to control the existence of some urls in jenkins to define javascript th ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Plugin.java. Successful exploitation could allow attackers to determine the date and time when a plugin hpi/jpi file was last extracted, which typically is the date o ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in BuildTimelineWidget.java. Successful exploitation could allow attackers with job/configure permission to define javascript that would be executed in another user's brows ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in SlaveComputer.java. Successful exploitation could allow attackers with overall/read permission to initiate agent launches, and abort in-progress agent launches.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in Queue.java. Successful exploitation could allow attackers with overall/read permission to cancel queued builds.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle crafted http requests. Successful exploitation could allow attackers to send crafted http requests returning the contents of any file on the jenkins master file system that the jenk ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted login credentials. Successful exploitation could allow attackers to obtain administrator privileges.


Pages:      Start    1616    1617    1618    1619    1620    1621    1622    1623    1624    1625    1626    1627    1628    1629    ..   3145

© SecPod Technologies