[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26622 Download | Alert*

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an untrusted data deserialisation vulnerability. A flaw is present in the application, which fails to properly handle REST API XML deserialization errors. Successful exploitation allows attackers allows attackers with View/Create, Job/Create, Agent/Create, or their respective */Configure ...

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the notification bar. Successful exploitation allows attackers to influence notification bar contents.

The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle an issue in the workspace browsers. Successful exploitation allows attackers with Job/Workspace permission and the ability to control workspace contents to create symbolic links tha ...

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an Improper restriction of rendered UI layers or frames vulnerability. A flaw is present in the application, which fails to properly handle an issues in REST API endpoints. Successful exploitation allow attackers to cause clickjacking attacks.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an improper Authorization vulnerability. A flaw is present in the application, which fails to properly handle an issues with privileged users having Overall/Read access. Successful exploitation allow attackers to view JVM memory usage chart.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in user's detail object in the whoAmI diagnostic page. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in non-constant time comparison function when validating HMAC. Successful exploitation allow attackers to cause unspecified impact.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in constant-time comparison function for validating connection secrets. Successful exploitation allow attackers to use a timing attack to obtain this information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to a network amplification vulnerability. A flaw is present in the application, which fails to properly handle issues in UDP amplification reflection. Successful exploitation allow attackers to cause denial of service.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.213 and is prone to a nonce key pair encryption vulnerability. A flaw is present in the application, which fails to properly handle issues in reuse of encryption key parameters. Successful exploitation allow attackers with knowledge of agent names to obtain the connection secrets for those agents, which can ...


Pages:      Start    11    12    13    14    15    16    17    18    19    20    21    22    23    24    ..   2662

© SecPod Technologies