Page 32 of 1626 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on an agent file system. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3145 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2903 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery (CSRF) vulnerability in Jenkins WSO2 Oauth Plugin 1.0 and earlier allows attackers to trick users into logging in to the attacker's account. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2990 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2991 • CWE-613: Insufficient Session Expiration •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A missing permission check in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers with Overall/Read permission to reset profiler statistics. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3083 • CWE-732: Incorrect Permission Assignment for Critical Resource •