Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-1003039 | 1 Jenkins | 1 Appdynamics | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
An insufficiently protected credentials vulnerability exists in JenkinsAppDynamics Dashboard Plugin 1.0.14 and earlier in src/main/java/nl/codecentric/jenkins/appd/AppDynamicsResultsPublisher.java that allows attackers without permission to obtain passwords configured in jobs to obtain them. | |||||
CVE-2019-1003001 | 2 Jenkins, Redhat | 2 Pipeline\, Openshift Container Platform | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. | |||||
CVE-2019-1003024 | 2 Jenkins, Redhat | 2 Script Security, Openshift Container Platform | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. | |||||
CVE-2020-2138 | 1 Jenkins | 1 Cobertura | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2021-21669 | 1 Jenkins | 1 Generic Webhook Trigger | 2023-10-25 | 7.5 HIGH | 9.8 CRITICAL |
Jenkins Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2019-1003079 | 1 Jenkins | 1 Vmware Lab Manager Slaves | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins VMware Lab Manager Slaves Plugin in the LabManager.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | |||||
CVE-2020-2313 | 1 Jenkins | 1 Azure Key Vault | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Azure Key Vault Plugin 2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2020-2183 | 1 Jenkins | 1 Copy Artifact | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Copy Artifact Plugin 1.43.1 and earlier performs improper permission checks, allowing attackers to copy artifacts from jobs they have no permission to access. | |||||
CVE-2020-2117 | 1 Jenkins | 1 Pipeline Github Notify Step | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2019-1003085 | 1 Jenkins | 1 Zephyr Enterprise Test Management | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Zephyr Enterprise Test Management Plugin in the ZeeDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | |||||
CVE-2019-10426 | 1 Jenkins | 1 Gem Publisher | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Gem Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2195 | 1 Jenkins | 1 Compact Columns | 2023-10-25 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Compact Columns Plugin 1.11 and earlier displays the unprocessed job description in tooltips, resulting in a stored cross-site scripting vulnerability that can be exploited by users with Job/Configure permission. | |||||
CVE-2020-2141 | 1 Jenkins | 1 P4 | 2023-10-25 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery vulnerability in Jenkins P4 Plugin 1.10.10 and earlier allows attackers to trigger builds or add a labels in Perforce. | |||||
CVE-2019-1003051 | 1 Jenkins | 1 Irc | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins IRC Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2260 | 1 Jenkins | 1 Perfecto | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Perfecto Plugin 1.17 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials. | |||||
CVE-2019-10413 | 1 Jenkins | 1 Data Theorem Mobile App Security | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Data Theorem: CI/CD Plugin 1.3 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2261 | 1 Jenkins | 1 Perfecto | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Perfecto Plugin 1.17 and earlier executes a command on the Jenkins controller, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller | |||||
CVE-2020-2130 | 1 Jenkins | 1 Harvest Scm | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Harvest SCM Plugin 0.5.1 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system. | |||||
CVE-2020-2146 | 1 Jenkins | 1 Mac | 2023-10-25 | 5.8 MEDIUM | 7.4 HIGH |
Jenkins Mac Plugin 1.1.0 and earlier does not validate SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks. | |||||
CVE-2019-1003070 | 1 Jenkins | 1 Veracode-scanner | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins veracode-scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. |