[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

This package is primarily used by Jenkins for slave node management, but it could be potentially reused outside of this project.

Jenkins is an award-winning, cross-platform, continuous integration and continuous delivery application that increases your productivity. Use Jenkins to build and test your software projects continuously making it easier for developers to integrate changes to the project, and making it easier for users to obtain a fresh build. It also allows you to continuously deliver your software by providing p ...

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in the API URL. Successful exploitation could allow remote authenticated users with extended read permission for the master node to obtain sensitive information about the glob ...

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in the API URL. Successful exploitation could allow remote authenticated users with extended read permission for the master node to obtain sensitive information about the global ...

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to multiple open redirect vulnerabilities. The flaws are present in the application, which fails to properly handle scheme-relative URLs. Successful exploitation could allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks.

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle scheme-relative URLs. Successful exploitation could allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks.

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a missing permissions check. Successful exploitation could allow remote authenticated users to trigger updating of update site metadata.

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a missing permissions check. Successful exploitation could allow remote authenticated users to trigger updating of update site metadata.

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle permission issues. Successful exploitation could allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.

The host is installed with Jenkins LTS before 1.651.2 or Jenkins rolling release before 2.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle permission issues. Successful exploitation could allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.


Pages:      Start    7925    7926    7927    7928    7929    7930    7931    7932    7933    7934    7935    7936    7937    7938    ..   19447

© SecPod Technologies