×
Configuring Content Security Policy. Table of Contents. The Default Rule Set; Customizing Content Security Policy. Considerations; Implementation. Making ...
Missing: xss | Show results with:xss
This guide documents how to identify components that will be incompatible with CSP rules and how to write and adapt UI code in a manner that is expected to be ...
Mar 25, 2020 · Search K. Jenkins ... See Configuring Content Security Policy to learn more. ... (XSS) vulnerability exploitable by users able to configure jobs.
Mar 8, 2023 · This advisory announces vulnerabilities in the following Jenkins deliverables: Jenkins (core); update-center2. Descriptions. XSS vulnerability ...
Oct 19, 2022 · This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this ...
Jan 13, 2021 · This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control TICS service response content. TICS ...
Mar 29, 2022 · This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. As of publication of ...
Mar 6, 2024 · This advisory announces vulnerabilities in the following Jenkins deliverables: AppSpider Plugin · Bitbucket Branch Source Plugin ...
Jan 24, 2024 · This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.
Mar 15, 2022 · This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions.
Missing: policy | Show results with:policy