Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10363 1 Jenkins 1 Configuration As Code 2023-10-25 4.0 MEDIUM 4.9 MEDIUM
Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.
CVE-2019-10447 1 Jenkins 1 Sofy.ai 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Sofy.AI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-16542 1 Jenkins 1 Anchore Container Image Scanner 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2021-21623 1 Jenkins 1 Matrix Authorization Strategy 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
CVE-2019-10473 1 Jenkins 1 Libvirt Slaves 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Libvirt Slaves Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-10289 1 Jenkins 1 Netsparker Cloud Scan 2023-10-25 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers to initiate a connection to an attacker-specified server.
CVE-2019-10459 1 Jenkins 1 Mattermost Notification 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Mattermost Notification Plugin 2.7.0 and earlier stored webhook URLs containing a secret token unencrypted in its global configuration file and job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-16550 1 Jenkins 1 Maven 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
CVE-2019-10421 1 Jenkins 1 Azure Event Grid Notifier 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Azure Event Grid Build Notifier Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2098 1 Jenkins 1 Sounds 2023-10-25 9.3 HIGH 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Sounds Plugin 0.5 and earlier allows attacker to execute arbitrary OS commands as the OS user account running Jenkins.
CVE-2019-10281 1 Jenkins 1 Relution Enterprise Appstore Publisher 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10439 1 Jenkins 1 Crx Content Package Deployer 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier in various 'doFillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-10435 1 Jenkins 1 Sourcegear Vault 2023-10-25 5.0 MEDIUM 7.5 HIGH
Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.
CVE-2019-10343 1 Jenkins 1 Configuration As Code 2023-10-25 2.1 LOW 3.3 LOW
Jenkins Configuration as Code Plugin 1.24 and earlier did not properly apply masking to values expected to be hidden when logging the configuration being applied.
CVE-2020-2221 1 Jenkins 1 Jenkins 2023-10-25 3.5 LOW 5.4 MEDIUM
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.
CVE-2019-10471 1 Jenkins 1 Libvirt Slaves 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Libvirt Slaves Plugin allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-1003049 3 Jenkins, Oracle, Redhat 3 Jenkins, Communications Cloud Native Core Automated Test Suite, Openshift Container Platform 2023-10-25 6.8 MEDIUM 8.1 HIGH
Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.
CVE-2019-1003025 1 Jenkins 1 Cloud Foundry 2023-10-25 4.0 MEDIUM 8.8 HIGH
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2020-2168 1 Jenkins 1 Azure Container Service 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2019-10288 1 Jenkins 1 Jabber Server 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.