×
A Security Realm which informs the Jenkins environment how and where to pull user (or identity) information from. Also commonly known as "authentication.".
This setting is controlled mainly by two axes: Security Realm, which determines users and their passwords, as well as what groups the users belong to.
A critical security vulnerability has been identified in the popular "Apache Log4j 2" library. This vulnerability is identified as CVE-2021-44228. Log4j in ...
Missing: web | Show results with:web
Oct 12, 2016 · This plugin is supported by Aspect Security. The purpose of this plugin is to allow Jenkins to perform static code analysis (SCA/SAST) with IBM ...
Missing: web | Show results with:web
Aug 23, 2023 · The internship took place while working in direct contact with the Jenkins Security Team, having daily meetings to discuss topics, possible ...
Missing: web | Show results with:web
Jan 25, 2024 · Sonar is a code quality and security tool that helps developers write Clean Code. Sonar analyzes code for issues that lead to unreliable, ...
May 9, 2019 · With multiple programming languages, automated testing frameworks, and security compliance tools being used by different applications within ...
Jul 5, 2010 · Hudson, like all web applications, is not immune from vulnerabilities that could open up attack vectors for malicious use.
Nov 12, 2016 · The Jenkins security team has been made aware of a new attack vector for a remote code execution vulnerability in the Jenkins CLI, according ...
Aug 10, 2016 · This is a guest post by R. Tyler Croy, who is a long-time contributor to Jenkins and the primary contact for Jenkins project infrastructure.