[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in Plugin.java. Successful exploitation could allow attackers to determine the date and time when a plugin hpi/jpi file was last extracted, which typically is the date o ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in BuildTimelineWidget.java. Successful exploitation could allow attackers with job/configure permission to define javascript that would be executed in another user's brows ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in BuildTimelineWidget.java. Successful exploitation could allow attackers with job/configure permission to define javascript that would be executed in another user's brows ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in SlaveComputer.java. Successful exploitation could allow attackers with overall/read permission to initiate agent launches, and abort in-progress agent launches.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in SlaveComputer.java. Successful exploitation could allow attackers with overall/read permission to initiate agent launches, and abort in-progress agent launches.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in Queue.java. Successful exploitation could allow attackers with overall/read permission to cancel queued builds.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in Queue.java. Successful exploitation could allow attackers with overall/read permission to cancel queued builds.

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle crafted http requests. Successful exploitation could allow attackers to send crafted http requests returning the contents of any file on the jenkins master file system that the jenk ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle crafted http requests. Successful exploitation could allow attackers to send crafted http requests returning the contents of any file on the jenkins master file system that the jenk ...

The host is installed with Jenkins LTS through 2.121.1 or Jenkins rolling release through 2.132 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle crafted login credentials. Successful exploitation could allow attackers to obtain administrator privileges.


Pages:      Start    7866    7867    7868    7869    7870    7871    7872    7873    7874    7875    7876    7877    7878    7879    ..   19407

© SecPod Technologies