[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10926 Download | Alert*

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in usage of CSRF tokens. Successful exploitation could allow attackers to bypass CSRF protection.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation could allow attackers to bypass permission checks and possibly obtain sensitive information.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/model/FileParameterValue.java file. Successful exploitation could allow attackers to cause an arbitrary file write on the Jenkins master when schedul ...

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in usage of CSRF tokens. Successful exploitation could allow attackers to bypass CSRF protection.

The host is installed with Jenkins LTS through 2.176.1 or Jenkins rolling release through 2.185 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation could allow attackers to bypass permission checks and possibly obtain sensitive information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.213 and is prone to a nonce key pair encryption vulnerability. A flaw is present in the application, which fails to properly handle issues in reuse of encryption key parameters. Successful exploitation allow attackers with knowledge of agent names to obtain the connection secrets for those agents, which can ...

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.213 and is prone to a nonce key pair encryption vulnerability. A flaw is present in the application, which fails to properly handle issues in reuse of encryption key parameters. Successful exploitation allow attackers with knowledge of agent names to obtain the connection secrets for those agents, which can ...

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to a network amplification vulnerability. A flaw is present in the application, which fails to properly handle issues in UDP amplification reflection. Successful exploitation allow attackers to cause denial of service.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to a network amplification vulnerability. A flaw is present in the application, which fails to properly handle issues in UDP amplification reflection. Successful exploitation allow attackers to cause denial of service.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in constant-time comparison function for validating connection secrets. Successful exploitation allow attackers to use a timing attack to obtain this information.


Pages:      Start    610    611    612    613    614    615    616    617    618    619    620    621    622    623    ..   1092

© SecPod Technologies