com.coravy.hudson.plugins.github:github@0.2 vulnerabilities
-
latest version
0.2
-
first published
14 years ago
-
latest version published
14 years ago
-
licenses detected
- [0.1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the com.coravy.hudson.plugins.github:github package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
com.coravy.hudson.plugins.github:github is a Jenkins GitHub plugin Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper escaping of How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.37.3.1)
|
com.coravy.hudson.plugins.github:github is a Jenkins GitHub plugin Affected versions of this package are vulnerable to Timing Attack when it uses a non-constant time comparison function to check whether the provided and computed webhook signatures are equal, it allows attackers to use statistical methods to obtain a valid webhook signature. How to fix Timing Attack? A fix was pushed into the |
[0,)
|
com.coravy.hudson.plugins.github:github integrates Jenkins with Github projects. Affected versions of this package are vulnerable to Information Exposure via the How to fix Information Exposure? Upgrade |
[,1.29.2)
|
com.coravy.hudson.plugins.github:github is a Jenkins GitHub plugin. Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). An attacker with Overall/Read access could cause Jenkins to send a How to fix Server-Side Request Forgery (SSRF)? Upgrade |
[,1.29.1)
|
com.coravy.hudson.plugins.github:github is a Jenkins GitHub plugin. Affected versions of this package are vulnerable to Information Exposure. A malicious user How to fix Information Exposure? Upgrade |
[,1.29.1)
|