![]() * Because these errors can be caused by a number of different issues involving both If they're happening while your Mac is sleeping, Jettison may be able to fix the problem.* The Red Hat security contact is contact details at. OpenShift Developer Tools and Services 4.12 SRPM More recent versions of these packages may be available. CVE-2023-32981 jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin CVE-2023-32977 jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin CVE-2023-1370 json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode CVE-2023-20861 springframework: Spring Expression DoS Vulnerability CVE-2023-20860 springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern CVE-2022-41723 net/http, /x/net/http2: avoid quadratic complexity in HPACK decoding CVE-2023-24422 jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin CVE-2022-45693 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CVE-2022-40149 jettison: parser crash by stackoverflow CVE-2022-40150 jettison: memory exhaustion via user-supplied XML or JSON data CVE-2022-30954 Jenkins plugin: missing permission checks in Blue Ocean Plugin CVE-2022-30953 Jenkins plugin: CSRF vulnerability in Blue Ocean Plugin CVE-2022-29599 maven-shared-utils: Command injection via Commandline class jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)įor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin (CVE-2023-32981).springframework: Spring Expression DoS Vulnerability (CVE-2023-20861).jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693).net/http, /x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723).jettison: parser crash by stackoverflow (CVE-2022-40149).Jenkins plugin: missing permission checks in Blue Ocean Plugin (CVE-2022-30954).Jenkins plugin: CSRF vulnerability in Blue Ocean Plugin (CVE-2022-30953).jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877).jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin (CVE-2023-32977).jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422).springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860).json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) (CVE-2023-1370). ![]() maven-shared-utils: Command injection via Commandline class (CVE-2022-29599).Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |