Google
×
May 17, 2022 · This vulnerability allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver. This form validation method no ...
Missing: standard | Show results with:standard
Oct 19, 2022 · This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default ...
Missing: standard | Show results with:standard
The following plugin provides functionality available through Pipeline-compatible steps. Read more about how to integrate steps into your Pipeline in the Steps ...
The checkout step will checkout code from source control; scm is a special variable which instructs the checkout step to clone the specific revision which ...
Mar 15, 2024 · Assigning roles · User groups represent authorities provided by the Security Realm (e.g. Active Directory or LDAP plugin can provide groups) ...
Missing: logging | Show results with:logging
Very basic UI, like the login form, the account signup form (if using the Jenkins user database as security realm), and some error pages ("Oops!").
Missing: standard | Show results with:standard
Mar 13, 2024 · This document provides the guidelines for using the SCM API. ... This leaves only one job with meaningless change logs ... Security · Contributing ...
This guide provides a small selection of best practices for pipelines and points out the most common mistakes. The goal is to point pipeline authors and ...
Thanks for your interest in reporting vulnerabilities to the Jenkins project! Please report them in the issue tracker under the SECURITY project. This project ...
To maximize security, credentials configured in Jenkins are stored in an encrypted form on the controller Jenkins instance (encrypted by the Jenkins instance ID) ...
Missing: standard | Show results with:standard