Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2192 1 Jenkins 1 Self-organizing Swarm Modules 2023-10-25 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier allows attackers to add or remove agent labels.
CVE-2019-10429 1 Jenkins 1 Gitlab Logo 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins GitLab Logo Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2020-2136 1 Jenkins 1 Git 2023-10-25 3.5 LOW 5.4 MEDIUM
Jenkins Git Plugin 4.2.0 and earlier does not escape the error message for the repository URL for Microsoft TFS field form validation, resulting in a stored cross-site scripting vulnerability.
CVE-2020-2258 1 Jenkins 1 Health Advisor By Cloudbees 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Health Advisor by CloudBees Plugin 3.2.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view that HTTP endpoint.
CVE-2019-1003033 1 Jenkins 1 Groovy 2023-10-25 6.5 MEDIUM 8.8 HIGH
A sandbox bypass vulnerability exists in Jenkins Groovy Plugin 2.1 and earlier in pom.xml, src/main/java/hudson/plugins/groovy/StringScriptSource.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.
CVE-2021-21657 1 Jenkins 1 Filesystem Trigger 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2019-10277 1 Jenkins 1 Starteam 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-1003048 1 Jenkins 1 Prqa 2023-10-25 2.1 LOW 7.8 HIGH
A vulnerability in Jenkins PRQA Plugin 3.1.0 and earlier allows attackers with local file system access to the Jenkins home directory to obtain the unencrypted password from the plugin configuration.
CVE-2020-2196 1 Jenkins 1 Selenium 2023-10-25 6.0 MEDIUM 8.0 HIGH
Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.
CVE-2019-10415 1 Jenkins 1 Violation Comments To Gitlab 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Violation Comments to GitLab Plugin 2.28 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10278 1 Jenkins 1 Jenkins-reviewbot 2023-10-25 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.
CVE-2019-10476 1 Jenkins 1 Zulip 2023-10-25 2.1 LOW 7.8 HIGH
Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-1003098 1 Jenkins 1 Openid 2023-10-25 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.
CVE-2019-1003018 1 Jenkins 1 Github Oauth 2023-10-25 4.3 MEDIUM 4.3 MEDIUM
An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
CVE-2020-2121 1 Jenkins 1 Google Kubernetes Engine 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2019-10279 1 Jenkins 1 Jenkins-reviewbot 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2020-2179 1 Jenkins 1 Yaml Axis 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2187 1 Jenkins 1 Amazon Ec2 2023-10-25 6.8 MEDIUM 5.6 MEDIUM
Jenkins Amazon EC2 Plugin 1.50.1 and earlier unconditionally accepts self-signed certificates and does not perform hostname validation, enabling man-in-the-middle attacks.
CVE-2020-2212 1 Jenkins 1 Github Coverage Reporter 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins GitHub Coverage Reporter Plugin 1.8 and earlier stores secrets unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system or read permissions on the system configuration.
CVE-2019-10424 1 Jenkins 1 Eloyente 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.