Total
275 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-1003057 | 1 Jenkins | 1 Bitbucket Approve | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Bitbucket Approve Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003063 | 1 Jenkins | 1 Amazon Sns Build Notifier | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Amazon SNS Build Notifier Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003094 | 1 Jenkins | 1 Open Stf | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Open STF Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003067 | 1 Jenkins | 1 Trac Publisher | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Trac Publisher Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2249 | 1 Jenkins | 1 Team Foundation Server | 2023-10-25 | 2.1 LOW | 3.3 LOW |
Jenkins Team Foundation Server Plugin 5.157.1 and earlier stores a webhook secret unencrypted in its global configuration file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system. | |||||
CVE-2019-1003074 | 1 Jenkins | 1 Hyper.sh Commons | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Hyper.sh Commons Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003089 | 1 Jenkins | 1 Upload To Pgyer | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Upload to pgyer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003054 | 1 Jenkins | 1 Jira Issue Updater | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Jira Issue Updater Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003088 | 1 Jenkins | 1 Fabric Beta Publisher | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Fabric Beta Publisher Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2250 | 1 Jenkins | 1 Soapui Pro Functional Testing | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system. | |||||
CVE-2019-1003073 | 1 Jenkins | 1 Vs Team Services Continuous Deployment | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins VS Team Services Continuous Deployment Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003060 | 1 Jenkins | 1 Official Owasp Zap | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Official OWASP ZAP Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003064 | 1 Jenkins | 1 Aws-device-farm | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003075 | 1 Jenkins | 1 Audit To Database | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Audit to Database Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003056 | 1 Jenkins | 1 Websphere Deployer | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins WebSphere Deployer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003062 | 1 Jenkins | 1 Aws Cloudwatch Logs Publisher | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins AWS CloudWatch Logs Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003071 | 1 Jenkins | 1 Octopusdeploy | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins OctopusDeploy Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003048 | 1 Jenkins | 1 Prqa | 2023-10-25 | 2.1 LOW | 7.8 HIGH |
A vulnerability in Jenkins PRQA Plugin 3.1.0 and earlier allows attackers with local file system access to the Jenkins home directory to obtain the unencrypted password from the plugin configuration. | |||||
CVE-2020-2239 | 1 Jenkins | 1 Parameterized Remote Trigger | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system. | |||||
CVE-2019-1003061 | 1 Jenkins | 1 Jenkins-cloudformation-plugin | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins jenkins-cloudformation-plugin Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. |