[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26616 Download | Alert*

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle missing permission check for paths. Successful exploitation allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scripting attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle excessive memory allocation in graph URLs. Successful exploitation allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available m ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle invalid fingerprint IDs. Successful exploitation allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid agent names. Successful exploitation allows attackers allows attackers to cause Jenkins to start up with unsafe legacy defaults after a restart.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an untrusted data deserialisation vulnerability. A flaw is present in the application, which fails to properly handle REST API XML deserialization errors. Successful exploitation allows attackers allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the notification bar. Successful exploitation allows attackers to influence notification bar contents.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.


Pages:      Start    1260    1261    1262    1263    1264    1265    1266    1267    1268    1269    1270    1271    1272    1273    ..   2661

© SecPod Technologies