[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Jenkins LTS before 2.32.2 or Jenkins rolling release before 2.44 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in AES ECB block cipher mode. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Jenkins LTS through 2.89.1 or Jenkins rolling release through 2.94 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle a startup issue. Successful exploitation could allow attackers to disable Cross-Site Request Forgery protection.

The host is installed with Jenkins LTS through 2.89.1 or Jenkins rolling release through 2.94 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle a startup issue. Successful exploitation could allow attackers to disable Cross-Site Request Forgery protection.

The host is installed with Jenkins LTS through 2.89.1 or Jenkins rolling release from 2.81 through 2.94 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle a startup issue. Successful exploitation could allow attackers to cause a failure to initialize the setup wizard on the first startup resulting in multiple security-related settin ...

The host is installed with Jenkins LTS through 2.89.1 or Jenkins rolling release through 2.81 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle a startup issue. Successful exploitation could allow attackers to cause a failure to initialize the setup wizard on the first startup resulting in multiple security-related settings not bei ...

The host is installed with Jenkins LTS through 2.73.1 or Jenkins rolling release through 2.83 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in form validation AJAX GET requests. Successful exploitation could allow attackers to obtain sensitive data via log files.

The host is installed with Jenkins LTS through 2.73.1 or Jenkins rolling release through 2.83 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in form validation AJAX GET requests. Successful exploitation could allow attackers to obtain sensitive data via log files.

The host is installed with Jenkins LTS through 2.73.1 or Jenkins rolling release through 2.83 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in /job/(job-name)/api. Successful exploitation could allow attackers to obtain information about upstream and downstream projects that were otherwise inaccessible.

The host is installed with Jenkins LTS through 2.73.1 or Jenkins rolling release through 2.83 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in /job/(job-name)/api. Successful exploitation could allow attackers to obtain information about upstream and downstream projects that were otherwise inaccessible.

The host is installed with Jenkins LTS through 2.73.1 or Jenkins rolling release through 2.83 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an isuee in /queue/item/(ID)/api. Successful exploitation could allow attackers to obtain information about tasks that were otherwise inaccessible.


Pages:      Start    8355    8356    8357    8358    8359    8360    8361    8362    8363    8364    8365    8366    8367    8368    ..   19630

© SecPod Technologies