Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34781 1 Jenkins 1 Xebialabs Xl Release 2024-01-09 4.0 MEDIUM 6.5 MEDIUM
Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2020-2268 1 Jenkins 1 Mongodb 2024-01-09 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins MongoDB Plugin 1.3 and earlier allows attackers to gain access to some metadata of any arbitrary files on the Jenkins controller.
CVE-2022-30957 1 Jenkins 1 Ssh 2024-01-09 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-28133 1 Jenkins 1 Bitbucket Server Integration 2024-01-09 3.5 LOW 5.4 MEDIUM
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
CVE-2022-30947 1 Jenkins 1 Git 2024-01-09 5.0 MEDIUM 7.5 HIGH
Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
CVE-2022-34795 1 Jenkins 1 Deployment Dashboard 2024-01-09 3.5 LOW 5.4 MEDIUM
Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not escape environment names on its Deployment Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
CVE-2015-8103 2 Jenkins, Redhat 2 Jenkins, Openshift Container Platform 2024-01-09 7.5 HIGH 9.8 CRITICAL
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
CVE-2023-40338 1 Jenkins 1 Folders 2024-01-02 N/A 4.3 MEDIUM
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier displays an error message that includes an absolute path of a log file when attempting to access the Scan Organization Folder Log if no logs are available, exposing information about the Jenkins controller file system.
CVE-2021-21675 1 Jenkins 1 Requests 2023-12-27 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins requests-plugin Plugin 2.2.12 and earlier allows attackers to create requests and/or have administrators apply pending requests.
CVE-2021-21655 1 Jenkins 1 P4 2023-12-27 5.8 MEDIUM 7.1 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
CVE-2022-34790 1 Jenkins 1 Extreme Feedback Panel 2023-12-22 3.5 LOW 5.4 MEDIUM
Jenkins eXtreme Feedback Panel Plugin 2.0.1 and earlier does not escape the job names used in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-27209 1 Jenkins 1 Kubernetes Continuous Deploy 2023-12-22 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-27214 1 Jenkins 1 Release Helper 2023-12-22 4.0 MEDIUM 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.
CVE-2022-28137 1 Jenkins 1 Jiratestresultreporter 2023-12-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
CVE-2022-27213 1 Jenkins 1 Environment Dashboard 2023-12-22 3.5 LOW 5.4 MEDIUM
Jenkins Environment Dashboard Plugin 1.1.10 and earlier does not escape the Environment order and the Component order configuration values in its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
CVE-2022-29051 1 Jenkins 1 Publish Over Ftp 2023-12-22 4.0 MEDIUM 4.3 MEDIUM
Missing permission checks in Jenkins Publish Over FTP Plugin 1.16 and earlier allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
CVE-2022-29050 1 Jenkins 1 Publish Over Ftp 2023-12-22 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.
CVE-2022-29052 1 Jenkins 1 Google Compute Engine 2023-12-22 4.0 MEDIUM 4.3 MEDIUM
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
CVE-2022-27216 1 Jenkins 1 Dbcharts 2023-12-22 4.0 MEDIUM 6.5 MEDIUM
Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2022-27215 1 Jenkins 1 Release Helper 2023-12-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.