Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10327 1 Jenkins 1 Pipeline Maven Integration 2023-10-25 5.5 MEDIUM 8.1 HIGH
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.
CVE-2020-2110 1 Jenkins 1 Script Security 2023-10-25 6.5 MEDIUM 8.8 HIGH
Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.
CVE-2019-16539 1 Jenkins 1 Support Core 2023-10-25 5.5 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete support bundles.
CVE-2019-16560 1 Jenkins 1 Websphere Deployer 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.
CVE-2020-2208 1 Jenkins 1 Slack Upload 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10346 1 Jenkins 1 Embeddable Build Status 2023-10-25 4.3 MEDIUM 6.1 MEDIUM
A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.
CVE-2019-10397 1 Jenkins 1 Aqua Security Severless Scanner 2023-10-25 2.6 LOW 3.1 LOW
Jenkins Aqua Security Serverless Scanner Plugin 1.0.4 and earlier transmitted configured passwords in plain text as part of job configuration forms, potentially resulting in their exposure.
CVE-2019-10282 1 Jenkins 1 Klaros-testmanagement 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10427 1 Jenkins 1 Aqua Microscanner 2023-10-25 5.0 MEDIUM 5.3 MEDIUM
Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
CVE-2020-2239 1 Jenkins 1 Parameterized Remote Trigger 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.
CVE-2020-2101 1 Jenkins 1 Jenkins 2023-10-25 3.5 LOW 5.3 MEDIUM
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
CVE-2019-1003061 1 Jenkins 1 Jenkins-cloudformation-plugin 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins jenkins-cloudformation-plugin Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2142 1 Jenkins 1 P4 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins P4 Plugin 1.10.10 and earlier allows attackers with Overall/Read permission to trigger builds.
CVE-2019-1003011 2 Jenkins, Redhat 2 Token Macro, Openshift Container Platform 2023-10-25 5.5 MEDIUM 8.1 HIGH
An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin 2.5 and earlier in src/main/java/org/jenkinsci/plugins/tokenmacro/Parser.java, src/main/java/org/jenkinsci/plugins/tokenmacro/TokenMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/AbstractChangesSinceMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ChangesSinceLastBuildMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ProjectUrlMacro.java that allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation.
CVE-2019-1003007 1 Jenkins 1 Warnings 2023-10-25 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability exists in Jenkins Warnings Plugin 5.0.0 and earlier in src/main/java/hudson/plugins/warnings/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.
CVE-2019-1003091 1 Jenkins 1 Soasta Cloudtest 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-16546 1 Jenkins 1 Google Compute Engine 2023-10-25 4.3 MEDIUM 5.9 MEDIUM
Jenkins Google Compute Engine Plugin 4.1.1 and earlier does not verify SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks.
CVE-2019-1003066 1 Jenkins 1 Bugzilla 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Bugzilla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-1003077 1 Jenkins 1 Audit To Database 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Audit to Database Plugin in the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2020-2122 1 Jenkins 1 Brakeman 2023-10-25 3.5 LOW 5.4 MEDIUM
Jenkins Brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability exploitable by users able to control the Brakeman post-build step input data.