May 17, 2022 · This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local ...
May 13, 2022 · This plugin uses Probely to scan your web application for security vulnerabilities. It enables security testing in your CI/CD pipeline.
Apr 9, 2024 · Enables user authorization using a Role-Based strategy. Roles can be defined globally or for particular jobs or nodes selected by regular ...
We strive to fix all security vulnerabilities in Jenkins and plugins in a timely manner. However, the structure of the Jenkins project, which gives plugin ...
Oct 19, 2022 · This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of ...
Apr 12, 2022 · This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of ...
Jul 27, 2022 · This allows attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file ...
Missing: web | Show results with:web
Authentication and User Management. This plugin enables various Extended Read permissions in Jenkins for jobs, system configuration, etc. Baptiste Mathus.
To maximize security, credentials configured in Jenkins are stored in an encrypted form on the controller Jenkins instance (encrypted by the Jenkins instance ID) ...
The Jenkins Configuration as Code (JCasC) feature defines Jenkins configuration parameters in a human-readable YAML file that can be stored as source code.