Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-46651 1 Jenkins 1 Warnings 2023-11-01 N/A 6.5 MEDIUM
Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1.
CVE-2023-46654 1 Jenkins 1 Cloudbees Cd 2023-11-01 N/A 8.1 HIGH
Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.
CVE-2023-46653 1 Jenkins 1 Lambdatest-automation 2023-11-01 N/A 6.5 MEDIUM
Jenkins lambdatest-automation Plugin 1.20.10 and earlier logs LAMBDATEST Credentials access token at the INFO level, potentially resulting in its exposure.
CVE-2023-46655 1 Jenkins 1 Cloudbees Cd 2023-11-01 N/A 6.5 MEDIUM
Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.
CVE-2023-46657 1 Jenkins 1 Gogs 2023-11-01 N/A 5.3 MEDIUM
Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
CVE-2023-46656 1 Jenkins 1 Multibranch Scan Webhook Trigger 2023-11-01 N/A 5.3 MEDIUM
Jenkins Multibranch Scan Webhook Trigger Plugin 1.0.9 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
CVE-2023-46658 1 Jenkins 1 Msteams Webhook Trigger 2023-11-01 N/A 5.3 MEDIUM
Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
CVE-2020-2306 1 Jenkins 1 Mercurial 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Mercurial Plugin 2.11 and earlier allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations.
CVE-2019-10332 1 Jenkins 1 Electricflow 2023-10-25 4.3 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials.
CVE-2020-2155 1 Jenkins 1 Openshift Deployer 2023-10-25 5.0 MEDIUM 5.3 MEDIUM
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
CVE-2019-16554 1 Jenkins 1 Build Failure Analyzer 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression.
CVE-2020-2123 1 Jenkins 1 Radargun 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2019-16566 1 Jenkins 1 Team Concert 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-10351 1 Jenkins 1 Caliper Ci 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Caliper CI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2240 1 Jenkins 1 Database 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to execute arbitrary SQL scripts.
CVE-2019-1003020 1 Jenkins 1 Kanboard 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A server-side request forgery vulnerability exists in Jenkins Kanboard Plugin 1.5.10 and earlier in KanboardGlobalConfiguration.java that allows attackers with Overall/Read permission to submit a GET request to an attacker-specified URL.
CVE-2020-2148 1 Jenkins 1 Mac 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.
CVE-2019-10352 1 Jenkins 1 Jenkins 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
CVE-2019-1003090 1 Jenkins 1 Soasta Cloudtest 2023-10-25 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.
CVE-2021-21658 1 Jenkins 1 Nuget 2023-10-25 6.4 MEDIUM 9.1 CRITICAL
Jenkins Nuget Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.