[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8289 Download | Alert*

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an access control vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to read and write the contents of any build directory stored in Jenkins with very few restrictions throu ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a potection mechanism failure vulnerability. A flaw is present in the application, which fails to handle the agent read/write access to the libs/ directory inside build directories. Successful exploitation could allow attackers in control of agent processes to replace the code of a trust ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an issue in FilePath#listFiles operations. Successful exploitation could allow attackers to list files outside directories that agents are allowed to access when following symbolic links.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle a permissions issue. Successful exploitation could allow attackers to make FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace to not ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access issue. Successful exploitation could allow attackers to check the agent-to-controller access only after creating the temporary files.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an issue in FilePath#renameTo and FilePath#moveAllChildrenTo operations. Successful exploitation could allow attackers to only check 'read' agent-to-controller access permission on the s ...

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to create symbolic links without the symlink permission.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle an issue in the agent processes. Successful exploitation could allow attackers to completely bypass file path filtering by wrapping the file operation in an agent file path.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to an access control vulnerability. A flaw is present in the application, which fails to handle an agent-to-controller access control issue. Successful exploitation could allow attackers to cause access control issue in FilePath#unzip and FilePath#untar.

The host is installed with Jenkins LTS through 2.303.2 or Jenkins rolling release through 2.318 and is prone to a missing authorization vulnerability. A flaw is present in the application, which fails to handle an issue in the agent-to-controller security check FilePath#reading(FileVisitor). Successful exploitation could allow attackers to have unrestricted read access using certain operations (cr ...


Pages:      Start    221    222    223    224    225    226    227    228    229    230    231    232    233    234    ..   828

© SecPod Technologies