Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10380 1 Jenkins 1 Simple Travis Pipeline Runner 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Simple Travis Pipeline Runner Plugin 1.0 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.
CVE-2019-1003050 3 Jenkins, Oracle, Redhat 3 Jenkins, Communications Cloud Native Core Automated Test Suite, Openshift Container Platform 2023-10-25 3.5 LOW 5.4 MEDIUM
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
CVE-2020-2092 1 Jenkins 1 Robot Framework 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Robot Framework Plugin 2.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing users with Job/Configure to have Jenkins parse crafted XML documents.
CVE-2019-1003089 1 Jenkins 1 Upload To Pgyer 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Upload to pgyer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10412 1 Jenkins 1 Inedo Proget 2023-10-25 5.0 MEDIUM 7.5 HIGH
Jenkins Inedo ProGet Plugin 1.2 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
CVE-2019-10302 1 Jenkins 1 Jira-ext 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10470 1 Jenkins 1 Kubernetes Ci 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-1003054 1 Jenkins 1 Jira Issue Updater 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Jira Issue Updater Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10399 1 Jenkins 1 Script Security 2023-10-25 4.9 MEDIUM 4.2 MEDIUM
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.
CVE-2019-10348 1 Jenkins 1 Gogs 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2021-21671 1 Jenkins 1 Jenkins 2023-10-25 5.1 MEDIUM 7.5 HIGH
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
CVE-2019-10362 1 Jenkins 1 Configuration As Code 2023-10-25 5.5 MEDIUM 5.4 MEDIUM
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
CVE-2019-1003087 1 Jenkins 1 Chef Sinatra 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2020-2209 1 Jenkins 1 Testcomplete Support 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-1003088 1 Jenkins 1 Fabric Beta Publisher 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Fabric Beta Publisher Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2180 1 Jenkins 1 Amazon Web Services Serverless Application Model 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2019-10340 1 Jenkins 1 Docker 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2021-21609 1 Jenkins 1 Jenkins 2023-10-25 5.0 MEDIUM 5.3 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.
CVE-2020-2095 1 Jenkins 1 Redgate Sql Change Automation 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10445 1 Jenkins 1 Google Kubernetes Engine 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.