Total
1025 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10424 | 1 Jenkins | 1 Eloyente | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2208 | 1 Jenkins | 1 Slack Upload | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10282 | 1 Jenkins | 1 Klaros-testmanagement | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2126 | 1 Jenkins | 1 Digitalocean | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system. | |||||
CVE-2019-10416 | 1 Jenkins | 1 Violation Comments To Gitlab | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Violation Comments to GitLab Plugin 2.28 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-16543 | 1 Jenkins | 1 Spira Importer | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2119 | 1 Jenkins | 1 Azure Ad | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins Azure AD Plugin 1.1.2 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2020-2145 | 1 Jenkins | 1 Zephyr Enterprise Test Management | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Zephyr Enterprise Test Management Plugin 1.9.1 and earlier stores its Zephyr password in plain text on the Jenkins master file system. | |||||
CVE-2019-16557 | 1 Jenkins | 1 Redgate Sql Change Automation | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Redgate SQL Change Automation Plugin 2.0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2318 | 1 Jenkins | 1 Mail Commander | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | |||||
CVE-2019-10295 | 1 Jenkins | 1 Crittercism-dsym | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins crittercism-dsym Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2021-21614 | 1 Jenkins | 1 Bumblebee Hp Alm | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2019-10297 | 1 Jenkins | 1 Sametime | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Sametime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2107 | 1 Jenkins | 1 Fortify | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Fortify Plugin 19.1.29 and earlier stores proxy server passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2128 | 1 Jenkins | 1 Ecx Copy Data Management | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins ECX Copy Data Management Plugin 1.9 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10303 | 1 Jenkins | 1 Azure Publishersettings Credentials | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2020-2198 | 1 Jenkins | 1 Project Inheritance | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure. | |||||
CVE-2020-2132 | 1 Jenkins | 1 Parasoft Environment Manager | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2181 | 1 Jenkins | 1 Credentials Binding | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps. | |||||
CVE-2020-2129 | 1 Jenkins | 1 Eagle Tester | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Eagle Tester Plugin 1.0.9 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system. |