[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15178 Download | Alert*

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle missing permission check for paths. Successful exploitation allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle missing permission check for paths. Successful exploitation allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scripting attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scripting attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle excessive memory allocation in graph URLs. Successful exploitation allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available m ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle excessive memory allocation in graph URLs. Successful exploitation allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available m ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle invalid fingerprint IDs. Successful exploitation allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle invalid fingerprint IDs. Successful exploitation allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid agent names. Successful exploitation allows attackers allows attackers to cause Jenkins to start up with unsafe legacy defaults after a restart.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid agent names. Successful exploitation allows attackers allows attackers to cause Jenkins to start up with unsafe legacy defaults after a restart.


Pages:      Start    650    651    652    653    654    655    656    657    658    659    660    661    662    663    ..   1517

© SecPod Technologies