Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-28149 | 1 Jenkins | 1 Job And Node Ownership | 2023-11-03 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2022-28151 | 1 Jenkins | 1 Job And Node Ownership | 2023-11-03 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. | |||||
CVE-2022-28154 | 1 Jenkins | 1 Coverage\/complexity Scatter Plot | 2023-11-03 | 5.5 MEDIUM | 8.1 HIGH |
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2022-28152 | 1 Jenkins | 1 Job And Node Ownership | 2023-11-03 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job. | |||||
CVE-2022-28155 | 1 Jenkins | 1 Pipeline\ | 2023-11-03 | 5.5 MEDIUM | 8.1 HIGH |
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2022-28157 | 1 Jenkins | 1 Pipeline\ | 2023-11-03 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server. | |||||
CVE-2022-28160 | 1 Jenkins | 1 Tests Selector | 2023-11-03 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2022-28159 | 1 Jenkins | 1 Tests Selector | 2023-11-03 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2022-28158 | 1 Jenkins | 1 Pipeline\ | 2023-11-03 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2020-2317 | 1 Jenkins | 1 Findbugs | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins FindBugs Plugin 5.0.0 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to Jenkins FindBugs Plugin's post build step. | |||||
CVE-2021-21603 | 1 Jenkins | 1 Jenkins | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability. | |||||
CVE-2020-2316 | 1 Jenkins | 1 Static Analysis Utilities | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2021-21610 | 1 Jenkins | 1 Jenkins | 2023-11-02 | 4.3 MEDIUM | 6.1 MEDIUM |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering a formatted preview of markup passed as a query parameter, resulting in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup. | |||||
CVE-2021-21608 | 1 Jenkins | 1 Jenkins | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels. | |||||
CVE-2021-21611 | 1 Jenkins | 1 Jenkins | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types. | |||||
CVE-2021-21619 | 1 Jenkins | 1 Claim | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins. | |||||
CVE-2021-21618 | 1 Jenkins | 1 Repository Connector | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Repository Connector Plugin 2.0.2 and earlier does not escape parameter names and descriptions for past builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2021-21616 | 1 Jenkins | 1 Active Choices | 2023-11-02 | 3.5 LOW | 4.6 MEDIUM |
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2022-30956 | 1 Jenkins | 1 Rundeck | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Rundeck Plugin 3.6.10 and earlier does not restrict URL schemes in Rundeck webhook submissions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Rundeck webhook payloads. | |||||
CVE-2022-29046 | 2 Apple, Jenkins | 2 Macos, Subversion | 2023-11-02 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. |