Jenkins WSO2 Oauth Plugin 1.0 and earlier does not implement a state parameter in its OAuth flow, a unique and non-guessable value associated with each authentication request. This vulnerability allow ...
Continue ReadingMay 17, 2023
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. As of p ...
Continue ReadingMay 17, 2023
The version of Jenkins Enterprise or Jenkins Operations Center running on the remote web server is 2.346.x prior to 2.346.40.0.17. It is, therefore, affected by multiple vulnerabilities including the ...
Continue ReadingMay 17, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins WSO2 Oauth Plugin 1.0 and earlier allows attackers to trick users into logging in to the attacker's account.Read More ...
Continue ReadingMay 16, 2023
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login.Read More ...
Continue ReadingMay 16, 2023
The remote Oracle Linux 9 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2023-2161 advisory. - OAuthLib is an implementation of the OAuth request-signing ...
Continue ReadingMay 16, 2023
Welcome to our April API newsletter, recapping some of the events of last month. This month’s topic is Generative AI tools (e.g., ChatGPT) in cybersecurity. It – along with API Security – domina ...
Continue ReadingMay 16, 2023
[]() It's easy to think high-tech companies have a security advantag ...
Continue ReadingMay 15, 2023
Back to Main