[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:65171
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the project naming strategy description. Successful exploitation could a ...

oval:org.secpod.oval:def:65172
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the project naming strategy description. Successful exploitation could a ...

oval:org.secpod.oval:def:1801802
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons. Tooltip values can be contributed by plugins, some of which use user-specified values.Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description that ...

oval:org.secpod.oval:def:65152
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the project naming strategy description. Successful exploitation could a ...

oval:org.secpod.oval:def:65155
The host is installed with Jenkins LTS through 2.235.3 or Jenkins rolling release through 2.251 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping the project naming strategy description. Successful exploitation could a ...

CPE    2
cpe:/a:jenkins:jenkins:::~~lts~~~
cpe:/a:jenkins:jenkins:::~~-~~~
CWE    1
CWE-79
*CVE
CVE-2020-2230

© SecPod Technologies