Download
| Alert*
oval:org.secpod.oval:def:1801810
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents .Jenkins 2.274 and earlier, LTS 2 ... oval:org.secpod.oval:def:68935 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in New Item page. Successful exploitation allows attackers to perform stored XSS a ... oval:org.secpod.oval:def:68970 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in New Item page. Successful exploitation allows attackers to perform stored XSS a ... oval:org.secpod.oval:def:68971 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in New Item page. Successful exploitation allows attackers to perform stored XSS a ... oval:org.secpod.oval:def:68912 The host is installed with Jenkins LTS through 2.263.1 or Jenkins rolling release through 2.274 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle an issue in New Item page. Successful exploitation allows attackers to perform stored XSS a ... |