Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10317 1 Jenkins 1 Sitemonitor 2023-10-25 4.3 MEDIUM 5.9 MEDIUM
Jenkins SiteMonitor Plugin 0.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.
CVE-2019-10320 1 Jenkins 1 Credentials 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
CVE-2019-10446 1 Jenkins 1 Cadence Vmanager 2023-10-25 6.4 MEDIUM 8.2 HIGH
Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.
CVE-2019-10334 1 Jenkins 1 Electricflow 2023-10-25 5.8 MEDIUM 6.5 MEDIUM
Jenkins ElectricFlow Plugin 1.1.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM when MultipartUtility.java is used to upload files.
CVE-2019-10414 1 Jenkins 1 Git Changelog 2023-10-25 3.5 LOW 6.5 MEDIUM
Jenkins Git Changelog Plugin 2.17 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-16573 1 Jenkins 1 Alauda Devops Pipeline 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-10464 1 Jenkins 1 Deploy Weblogic 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Deploy WebLogic Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system.
CVE-2019-10368 1 Jenkins 1 Jclouds 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2020-2160 1 Jenkins 1 Jenkins 2023-10-25 6.8 MEDIUM 8.8 HIGH
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.
CVE-2019-1003023 1 Jenkins 1 Warnings Next Generation 2023-10-25 4.3 MEDIUM 6.1 MEDIUM
A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML.
CVE-2019-10440 1 Jenkins 1 Neoload 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10285 1 Jenkins 1 Minio Storage 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Minio Storage Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10417 1 Jenkins 1 Kubernetes Pipeline 2023-10-25 6.5 MEDIUM 9.9 CRITICAL
Jenkins Kubernetes :: Pipeline :: Kubernetes Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
CVE-2019-10408 1 Jenkins 1 Project Inheritance 2023-10-25 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery vulnerability in Jenkins Project Inheritance Plugin 2.0.0 and earlier allowed attackers to trigger project generation from templates.
CVE-2019-10434 1 Jenkins 1 Ldap Email 2023-10-25 5.0 MEDIUM 7.5 HIGH
Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
CVE-2021-21632 1 Jenkins 1 Owasp Dependency-track 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins.
CVE-2019-10442 1 Jenkins 1 Icescrum 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
CVE-2019-16551 1 Jenkins 1 Gerrit Trigger 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials.
CVE-2020-2299 1 Jenkins 1 Active Directory 2023-10-25 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
CVE-2019-10369 1 Jenkins 1 Jclouds 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.