[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31160 Download | Alert*

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an issue in FilePath#listFiles operations. Successful exploitation could allow attackers to list files outside directories that agents are allowed to access when following symbolic links.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle a permissions issue. Successful exploitation could allow attackers to make FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace to not ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access issue. Successful exploitation could allow attackers to check the agent-to-controller access only after creating the temporary files.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an issue in FilePath#renameTo and FilePath#moveAllChildrenTo operations. Successful exploitation could allow attackers to only check 'read' agent-to-controller access permission on the s ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to create symbolic links without the symlink permission.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an issue in the agent processes. Successful exploitation could allow attackers to completely bypass file path filtering by wrapping the file operation in an agent file path.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an access control vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to cause access control issue in FilePath#unzip and FilePath#untar.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an issue in the agent-to-controller security check FilePath#reading(FileVisitor). Successful exploitation could allow attackers to have unrestricted read access using certain operations (cr ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access issue in FilePath#untar. Successful exploitation could allow attackers to perform operations to create symbolic links when unarchiving a symbolic link without ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle an issue in file path filters in the agent-to-controller security subsystem. Successful exploitation could allow attackers to perform operations to follow symbolic links to outside allowed directo ...


Pages:      Start    1503    1504    1505    1506    1507    1508    1509    1510    1511    1512    1513    1514    1515    1516    ..   3115

© SecPod Technologies