The default markup formatter in Jenkins CI v1.523 allows offsite-bound forms, leading to HTML injectio
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
seebug.org | Jenkins 1.523 - Inject Persistent HTML Code | 1 Jul 201400:00 | – | seebug |
securityvulns | [CVE-2013-5676] Plain Text Password In SonarQube Jenkins Plugin | 9 Jan 201400:00 | – | securityvulns |
securityvulns | Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 9 Jan 201400:00 | – | securityvulns |
Prion | Cross site scripting | 31 Dec 201316:04 | – | prion |
UbuntuCve | CVE-2013-5573 | 31 Dec 201300:00 | – | ubuntucve |
Packet Storm | Jenkins CI 1.523 Persistent Script Insertion | 19 Dec 201300:00 | – | packetstorm |
exploitpack | Jenkins 1.523 - Persistent HTML Code | 18 Dec 201300:00 | – | exploitpack |
Exploit DB | Jenkins 1.523 - Persistent HTML Code | 18 Dec 201300:00 | – | exploitdb |
Cvelist | CVE-2013-5573 | 31 Dec 201315:00 | – | cvelist |
Veracode | Cross-site Scripting (XSS) | 15 Jan 201908:54 | – | veracode |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo