×
When your Jenkins is secured, you can use HTTP BASIC authentication to authenticate remote API requests. See Authenticating scripted clients for more details.
This includes the TCP-based communication protocols, remote procedure calls, class loading, data streaming, etc. Currently Remoting is primarily used in ...
Missing: testing | Show results with:testing
Jan 24, 2024 · Attackers know, or can guess, the user name of any user with Overall/Read permission. Remote code execution via Resource Root URLs (Variant 2)
Remote API and security. When your Jenkins is secured, you can use HTTP BASIC authentication to authenticate remote API requests. See Authenticating scripted ...
Search Box · Referencing another project by name · Aborting a build · Fingerprints · Using local language · Change time zone · Remote Access API · Executor ...
veracode : Upload and Scan with Veracode Pipeline · If you do not select this checkbox (default), the output files are uploaded to Veracode from the remote ...
Nov 15, 2022 · Remote code execution vulnerability in Pipeline Utility Steps Plugin. SECURITY-2948 / CVE-2022-33980. Severity (CVSS): High Affected plugin ...
Set to true to permit accessing the Jenkins remote API in an unsafe manner. See SECURITY-47. Deprecated, use e.g. Secure Requester Whitelist instead. hudson ...
Remote access; Shortcut key on script console to submit; Video Tutorials and additional learning materials; Example Groovy scripts. Out of date scripts. Plugins ...
A remote code execution vulnerability has been identified in the Spring Framework. This vulnerability is identified as CVE-2022-22965. Spring officially ...