Jenkins before 1.502 allows remote authenticated users to configure restricted project via post-build action
Reporter | Title | Published | Views | Family All 19 |
---|---|---|---|---|
Github Security Blog | Jenkins allows attackers to configure restricted projects | 17 May 202203:53 | β | github |
Github Security Blog | Jenkins allows attackers to execute arbitrary jobs | 17 May 202203:53 | β | github |
Prion | Design/Logic Flaw | 17 Oct 201415:55 | β | prion |
Prion | Design/Logic Flaw | 17 Oct 201415:55 | β | prion |
Veracode | Authorization Bypass | 2 May 201904:55 | β | veracode |
NVD | CVE-2013-7330 | 17 Oct 201415:55 | β | nvd |
NVD | CVE-2014-2058 | 17 Oct 201415:55 | β | nvd |
OSV | Jenkins allows attackers to configure restricted projects | 17 May 202203:53 | β | osv |
OSV | Jenkins allows attackers to execute arbitrary jobs | 17 May 202203:53 | β | osv |
OSV | Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 2.1 jenkins-plugin-openshift bug fix update | 15 Sep 202422:07 | β | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo