Total
1025 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2182 | 1 Jenkins | 1 Credentials Binding | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets containing a `$` character in some circumstances. | |||||
CVE-2019-10313 | 1 Jenkins | 1 Twitter | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-16542 | 1 Jenkins | 1 Anchore Container Image Scanner | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10459 | 1 Jenkins | 1 Mattermost Notification | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Mattermost Notification Plugin 2.7.0 and earlier stored webhook URLs containing a secret token unencrypted in its global configuration file and job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10421 | 1 Jenkins | 1 Azure Event Grid Notifier | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Azure Event Grid Build Notifier Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10281 | 1 Jenkins | 1 Relution Enterprise Appstore Publisher | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10288 | 1 Jenkins | 1 Jabber Server | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2131 | 1 Jenkins | 1 Harvest Scm | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Harvest SCM Plugin 0.5.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10461 | 1 Jenkins | 1 Dynatrace Application Monitoring | 2023-10-25 | 2.1 LOW | 7.8 HIGH |
Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10294 | 1 Jenkins | 1 Kmap | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Kmap Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10316 | 1 Jenkins | 1 Aqua Microscanner | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-1003038 | 1 Jenkins | 1 Repository Connector | 2023-10-25 | 2.1 LOW | 7.8 HIGH |
An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration. | |||||
CVE-2019-10287 | 1 Jenkins | 1 Youtrack-plugin | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins youtrack-plugin Plugin 0.7.1 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10423 | 1 Jenkins | 1 Codescan | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins CodeScan Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2291 | 1 Jenkins | 1 Couchdb-statistics | 2023-10-25 | 2.1 LOW | 3.3 LOW |
Jenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2020-2213 | 1 Jenkins | 1 White Source | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system. | |||||
CVE-2019-10420 | 1 Jenkins | 1 Assembla | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10299 | 1 Jenkins | 1 Cloudcoreo Deploytime | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins CloudCoreo DeployTime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10283 | 1 Jenkins | 1 Mabl | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10347 | 1 Jenkins | 1 Mashup Portlets | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system. |