[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9522 Download | Alert*

The host is installed with Jenkins LTS 2.277.1 through 2.375.3 or Jenkins rolling 2.270 through 2.329 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow attackers to provide plugins to the configured update sites and have this message shown by Jenkins instances.

The host is installed with Jenkins LTS 2.277.1 through 2.375.3 or Jenkins rolling 2.270 through 2.393 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow attackers to provide plugins to the configured update sites and have this message shown by Jenkins instances.

The host is installed with Jenkins LTS 2.277.1 through 2.375.3 or Jenkins rolling 2.270 through 2.393 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow attackers to provide plugins to the configured update sites and have this message shown by Jenkins instances.

The host is installed with Jenkins LTS 2.277.1 through 2.375.3 or Jenkins rolling 2.270 through 2.393 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow attackers to provide plugins to the configured update sites and have this message shown by Jenkins instances.

The host is installed with Jenkins LTS 2.277.1 through 2.375.3 or Jenkins rolling 2.270 through 2.393 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow attackers to provide plugins to the configured update sites and have this message shown by Jenkins instances.

The host is installed with Jenkins LTS 2.277.1 through 2.375.3 or Jenkins rolling 2.270 through 2.393 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow attackers to provide plugins to the configured update sites and have this message shown by Jenkins instances.

Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have thi ...

Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents.

The host is installed with Jenkins LTS through 2.401.2 or Jenkins rolling through 2.415 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly encode URLs in build logs when transforming them into hyperlinks. Successful exploitation could allow attackers to perform stored cross site scripting.

The host is installed with Jenkins LTS through 2.401.2 or Jenkins rolling through 2.415 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly encode URLs in build logs when transforming them into hyperlinks. Successful exploitation could allow attackers to perform stored cross site scripting.


Pages:      Start    331    332    333    334    335    336    337    338    339    340    341    342    343    344    ..   952

© SecPod Technologies