Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-16570 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server. | |||||
CVE-2019-1003062 | 1 Jenkins | 1 Aws Cloudwatch Logs Publisher | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins AWS CloudWatch Logs Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003034 | 2 Jenkins, Redhat | 2 Job Dsl, Openshift Container Platform | 2023-10-25 | 6.5 MEDIUM | 9.9 CRITICAL |
A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM. | |||||
CVE-2019-10315 | 1 Jenkins | 1 Github Authentication | 2023-10-25 | 6.8 MEDIUM | 8.8 HIGH |
Jenkins GitHub Authentication Plugin 0.31 and earlier did not use the state parameter of OAuth to prevent CSRF. | |||||
CVE-2020-2251 | 1 Jenkins | 2 Jenkins, Soapui Pro Functional Testing | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2019-10456 | 1 Jenkins | 1 Oracle Cloud Infrastructure Compute Classic | 2023-10-25 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Oracle Cloud Infrastructure Compute Classic Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2019-1003082 | 1 Jenkins | 1 Gearman | 2023-10-25 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Gearman Plugin in the GearmanPluginConfig#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2019-10419 | 1 Jenkins | 1 Vfabric Application Director | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins vFabric Application Director Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2254 | 1 Jenkins | 1 Blue Ocean | 2023-10-25 | 3.5 LOW | 6.5 MEDIUM |
Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system. | |||||
CVE-2019-1003084 | 1 Jenkins | 1 Zephyr Enterprise Test Management | 2023-10-25 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Zephyr Enterprise Test Management Plugin in the ZeeDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2020-2094 | 1 Jenkins | 1 Health Advisor By Cloudbees | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Health Advisor by CloudBees Plugin 3.0 and earlier allows attackers with Overall/Read permission to send a fixed email to an attacker-specific recipient. | |||||
CVE-2021-21661 | 1 Jenkins | 1 Kubernetes | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2019-1003071 | 1 Jenkins | 1 Octopusdeploy | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins OctopusDeploy Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2177 | 1 Jenkins | 1 Copr | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Copr Plugin 0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10475 | 1 Jenkins | 1 Build-metrics | 2023-10-25 | 4.3 MEDIUM | 6.1 MEDIUM |
A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin. | |||||
CVE-2019-10460 | 1 Jenkins | 1 Bitbucket Oauth | 2023-10-25 | 2.1 LOW | 7.8 HIGH |
Jenkins Bitbucket OAuth Plugin 0.9 and earlier stored credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10373 | 1 Jenkins | 1 Build Pipeline | 2023-10-25 | 3.5 LOW | 5.4 MEDIUM |
A stored cross-site scripting vulnerability in Jenkins Build Pipeline Plugin 1.5.8 and earlier allows attackers able to edit the build pipeline description to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins. | |||||
CVE-2019-10372 | 1 Jenkins | 1 Gitlab Oauth | 2023-10-25 | 5.8 MEDIUM | 6.1 MEDIUM |
An open redirect vulnerability in Jenkins Gitlab Authentication Plugin 1.4 and earlier in GitLabSecurityRealm.java allows attackers to redirect users to a URL outside Jenkins after successful login. | |||||
CVE-2020-2301 | 1 Jenkins | 1 Active Directory | 2023-10-25 | 7.5 HIGH | 9.8 CRITICAL |
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode. | |||||
CVE-2019-10411 | 1 Jenkins | 1 Inedo Buildmaster | 2023-10-25 | 5.0 MEDIUM | 7.5 HIGH |
Jenkins Inedo BuildMaster Plugin 2.4.0 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. |