[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in user's detail object in the whoAmI diagnostic page. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an improper Authorization vulnerability. A flaw is present in the application, which fails to properly handle an issues with privileged users having Overall/Read access. Successful exploitation allow attackers to view JVM memory usage chart.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an improper Authorization vulnerability. A flaw is present in the application, which fails to properly handle an issues with privileged users having Overall/Read access. Successful exploitation allow attackers to view JVM memory usage chart.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an Improper restriction of rendered UI layers or frames vulnerability. A flaw is present in the application, which fails to properly handle an issues in REST API endpoints. Successful exploitation allow attackers to cause clickjacking attacks.

The host is installed with Jenkins LTS through 2.204.1 or Jenkins rolling release through 2.218 and is prone to an Improper restriction of rendered UI layers or frames vulnerability. A flaw is present in the application, which fails to properly handle an issues in REST API endpoints. Successful exploitation allow attackers to cause clickjacking attacks.

The host is installed with Jenkins LTS through 2.204.5 or Jenkins rolling release through 2.227 and is prone to a cross-site-request-forgery vulnerability. A flaw is present in the application, which fails to properly handle crafted URLs. Successful exploitation could allow attackers to bypass CSRF protection of any target URL.

The host is installed with Jenkins LTS through 2.204.5 or Jenkins rolling release through 2.227 and is prone to a cross-site-request-forgery vulnerability. A flaw is present in the application, which fails to properly handle crafted URLs. Successful exploitation could allow attackers to bypass CSRF protection of any target URL.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an escaping agent name in the build time trend page. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an escaping agent name in the build time trend page. Successful exploitation could allow attackers to cause a stored XSS vulnerability.

The host is installed with Jenkins LTS through 2.235.1 or Jenkins rolling release through 2.244 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle escaping upstream job's display name shown as part of a build cause. Successful exploitation could allow attackers to cause a stored XSS vulnerability.


Pages:      Start    966    967    968    969    970    971    972    973    974    975    976    977    978    979    ..   1524

© SecPod Technologies