[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26703 Download | Alert*

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to a network amplification vulnerability. A flaw is present in the application, which fails to properly handle issues in UDP amplification reflection. Successful exploitation allow attackers to cause denial of service.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in constant-time comparison function for validating connection secrets. Successful exploitation allow attackers to use a timing attack to obtain this information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an observable timing discrepancy vulnerability. A flaw is present in the application, which fails to properly handle issues in non-constant time comparison function when validating HMAC. Successful exploitation allow attackers to cause unspecified impact.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in user's detail object in the whoAmI diagnostic page. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an improper Authorization vulnerability. A flaw is present in the application, which fails to properly handle an issues with privileged users having Overall/Read access. Successful exploitation allow attackers to view JVM memory usage chart.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an Improper restriction of rendered UI layers or frames vulnerability. A flaw is present in the application, which fails to properly handle an issues in REST API endpoints. Successful exploitation allow attackers to cause clickjacking attacks.

The host is installed with Jenkins LTS through 2.204.5 or Jenkins rolling release through 2.227 and is prone to a cross-site-request-forgery vulnerability. A flaw is present in the application, which fails to properly handle crafted URLs. Successful exploitation could allow attackers to bypass CSRF protection by of any target URL.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an escaping agent name in the build time trend page. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping upstream job's display name shown as part of a build cause. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping job name in the 'Keep this build forever' badge tooltip. Successful exploitation could allow attackers to cause a stored XSS vulnerability.


Pages:      Start    1634    1635    1636    1637    1638    1639    1640    1641    1642    1643    1644    1645    1646    1647    ..   2670

© SecPod Technologies