[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26622 Download | Alert*

The host is installed with Jenkins LTS through 2.277.1 or Jenkins rolling release through 2.286 and is prone to a view name validation bypass vulnerability. A flaw is present in the application, which fails to properly check that a newly created view has an allowed name. Successful exploitation allows attackers with View/Create permission to create views with invalid or already-used names.

The host is installed with Jenkins LTS through 2.277.1 or Jenkins rolling release through 2.286 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle an object type validation issue. Successful exploitation allows attackers with Computer/Configure permission to replace a node with one of a different type.

The host is installed with Jenkins LTS through 2.263.2 or Jenkins rolling release through 2.275 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an time-of-check to time-of-use (TOCTOU) race condition issue in workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to contro ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in New Item page. Successful exploitation allows attackers to perform stored XSS attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a reflected XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in markup formatter preview. Successful exploitation allows attackers to perform reflected XSS attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle missing permission check for paths. Successful exploitation allows attackers without Overall/Read permission to access plugin-provided URLs with any of the following prefixes if ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unescaped button labels. Successful exploitation allows attackers to perform cross-site scripting attacks.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle excessive memory allocation in graph URLs. Successful exploitation allows attackers to request or to have legitimate Jenkins users request crafted URLs that rapidly use all available m ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle invalid fingerprint IDs. Successful exploitation allows attackers with Overall/Read permission to check for the existence of XML files on the controller file system where the ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid agent names. Successful exploitation allows attackers allows attackers to cause Jenkins to start up with unsafe legacy defaults after a restart.


Pages:      Start    10    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   2662

© SecPod Technologies