Download
| Alert*
oval:org.secpod.oval:def:1801810
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents .Jenkins 2.274 and earlier, LTS 2 ... oval:org.secpod.oval:def:68964 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scr ... oval:org.secpod.oval:def:68932 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scr ... oval:org.secpod.oval:def:68965 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scr ... oval:org.secpod.oval:def:68909 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scr ... |