Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2284 | 1 Jenkins | 1 Liquibase Runner | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2147 | 1 Jenkins | 1 Mac | 2023-10-25 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Mac Plugin 1.1.0 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials. | |||||
CVE-2020-2312 | 1 Jenkins | 1 Sqlplus Script Runner | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins SQLPlus Script Runner Plugin 2.0.12 and earlier does not mask a password provided as command line argument in build logs. | |||||
CVE-2019-1003022 | 1 Jenkins | 1 Monitoring | 2023-10-25 | 4.3 MEDIUM | 6.5 MEDIUM |
A denial of service vulnerability exists in Jenkins Monitoring Plugin 1.74.0 and earlier in PluginImpl.java that allows attackers to kill threads running on the Jenkins master. | |||||
CVE-2020-2211 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin 1.3 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2219 | 1 Jenkins | 1 Link Column | 2023-10-25 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Link Column Plugin 1.0 and earlier does not filter URLs of links created by users with View/Configure permission, resulting in a stored cross-site scripting vulnerability. | |||||
CVE-2020-2157 | 1 Jenkins | 1 Skytap Cloud Ci | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2021-21626 | 1 Jenkins | 1 Warnings Next Generation | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. | |||||
CVE-2019-10311 | 1 Jenkins | 1 Ansible Tower | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2020-2314 | 1 Jenkins | 1 Appspider | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2019-10398 | 1 Jenkins | 1 Beaker Builder | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Beaker Builder Plugin 1.9 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2021-21643 | 1 Jenkins | 1 Config File Provider | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins. | |||||
CVE-2019-10382 | 1 Jenkins | 1 Vmware Lab Manager Slaves | 2023-10-25 | 5.8 MEDIUM | 6.5 MEDIUM |
Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM. | |||||
CVE-2019-10462 | 1 Jenkins | 1 Dynatrace Application Monitoring | 2023-10-25 | 6.8 MEDIUM | 8.1 HIGH |
A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2020-2226 | 1 Jenkins | 1 Matrix Authorization Strategy | 2023-10-25 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Matrix Authorization Strategy Plugin 2.6.1 and earlier does not escape user names shown in the configuration, resulting in a stored cross-site scripting vulnerability. | |||||
CVE-2019-10378 | 1 Jenkins | 1 Testlink | 2023-10-25 | 2.1 LOW | 5.3 MEDIUM |
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2020-2245 | 1 Jenkins | 1 Valgrind | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Valgrind Plugin 0.28 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2019-10312 | 1 Jenkins | 1 Ansible Tower | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doFillTowerCredentialsIdItems method allowed attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins. | |||||
CVE-2019-16567 | 1 Jenkins | 1 Team Concert | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | |||||
CVE-2019-1003083 | 1 Jenkins | 1 Gearman | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Gearman Plugin in the GearmanPluginConfig#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. |