Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10444 | 1 Jenkins | 1 Bumblebee Hp Alm | 2023-10-25 | 6.4 MEDIUM | 6.5 MEDIUM |
Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM. | |||||
CVE-2019-10468 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2019-10391 | 1 Jenkins | 1 Ibm Application Security On Cloud | 2023-10-25 | 4.3 MEDIUM | 6.5 MEDIUM |
Jenkins IBM Application Security on Cloud Plugin 1.2.4 and earlier transmitted configured passwords in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2021-21650 | 1 Jenkins | 1 S3 Publisher | 2023-10-25 | 3.5 LOW | 4.3 MEDIUM |
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. | |||||
CVE-2019-16552 | 1 Jenkins | 1 Gerrit Trigger | 2023-10-25 | 5.5 MEDIUM | 5.4 MEDIUM |
A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master. | |||||
CVE-2019-10355 | 2 Jenkins, Redhat | 2 Script Security, Openshift Container Platform | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts. | |||||
CVE-2019-10359 | 1 Jenkins | 1 M2release | 2023-10-25 | 6.8 MEDIUM | 6.3 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options. | |||||
CVE-2020-2274 | 1 Jenkins | 1 Elastest | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2019-10472 | 1 Jenkins | 1 Libvirt Slaves | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Libvirt Slaves Plugin allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2020-2109 | 1 Jenkins | 1 Pipeline\ | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods. | |||||
CVE-2019-1003092 | 1 Jenkins | 1 Nomad | 2023-10-25 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2020-2125 | 1 Jenkins | 1 Debian Package Builder | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Debian Package Builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system. | |||||
CVE-2019-10400 | 1 Jenkins | 1 Script Security | 2023-10-25 | 4.9 MEDIUM | 4.2 MEDIUM |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts. | |||||
CVE-2020-2277 | 1 Jenkins | 1 Storable Configs | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Storable Configs Plugin 1.0 and earlier allows users with Job/Read permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2020-2279 | 1 Jenkins | 1 Script Security | 2023-10-25 | 6.5 MEDIUM | 9.9 CRITICAL |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM. | |||||
CVE-2019-10448 | 1 Jenkins | 1 Extensive Testing | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2171 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2019-16565 | 1 Jenkins | 1 Team Concert | 2023-10-25 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery vulnerability in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2020-2134 | 1 Jenkins | 1 Script Security | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted constructor calls and crafted constructor bodies. | |||||
CVE-2019-10364 | 1 Jenkins | 1 Ec2 | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Amazon EC2 Plugin 1.43 and earlier wrote the beginning of private keys to the Jenkins system log. |