Download
| Alert*
oval:org.secpod.oval:def:58817
The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:expandableTextBox form controls. Successful exploitation cou ... oval:org.secpod.oval:def:58811 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:expandableTextBox form controls. Successful exploitation cou ... oval:org.secpod.oval:def:58818 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:combobox form controls. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:58812 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in f:combobox form controls. Successful exploitation could allow attacke ... oval:org.secpod.oval:def:58813 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping tag name on a tooltip. Successful exploitation could ... oval:org.secpod.oval:def:58819 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping tag name on a tooltip. Successful exploitation could ... oval:org.secpod.oval:def:58814 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping the reason a queue item is blocked in tooltips. Succe ... oval:org.secpod.oval:def:58820 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in escaping the reason a queue item is blocked in tooltips. Succe ... oval:org.secpod.oval:def:58815 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the WhoAmI URL. Successful exploitation could allow attackers to obta ... oval:org.secpod.oval:def:58821 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the WhoAmI URL. Successful exploitation could allow attackers to obta ... oval:org.secpod.oval:def:58816 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in filtering the values specified by administrators as jenkins root URL. ... oval:org.secpod.oval:def:58822 The host is installed with Jenkins LTS through 2.176.3 or Jenkins rolling release through 2.196 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in filtering the values specified by administrators as jenkins root URL. ... |