Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1647 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2126 1 Jenkins 1 Digitalocean 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
CVE-2019-16569 1 Jenkins 1 Mantis 2023-10-25 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery vulnerability in Jenkins Mantis Plugin 0.26 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.
CVE-2020-2253 1 Jenkins 1 Email Extension 2023-10-25 5.8 MEDIUM 4.8 MEDIUM
Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.
CVE-2019-10416 1 Jenkins 1 Violation Comments To Gitlab 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Violation Comments to GitLab Plugin 2.28 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10314 1 Jenkins 1 Koji 2023-10-25 4.3 MEDIUM 5.9 MEDIUM
Jenkins Koji Plugin disables SSL/TLS and hostname verification globally for the Jenkins master JVM.
CVE-2019-16543 1 Jenkins 1 Spira Importer 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-1003035 1 Jenkins 1 Azure Vm Agents 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java, src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to perform the 'verify configuration' form validation action, thereby obtaining limited information about the Azure configuration.
CVE-2019-10336 1 Jenkins 1 Electricflow 2023-10-25 4.3 MEDIUM 6.1 MEDIUM
A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin.
CVE-2020-2166 1 Jenkins 1 Pipeline\ 2023-10-25 6.5 MEDIUM 8.8 HIGH
Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2019-10335 1 Jenkins 1 Electricflow 2023-10-25 3.5 LOW 5.4 MEDIUM
A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
CVE-2019-10350 1 Jenkins 1 Port Allocator 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins Port Allocator Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2201 1 Jenkins 1 Sonargraph Integration 2023-10-25 3.5 LOW 5.4 MEDIUM
Jenkins Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation, resulting in a stored cross-site scripting vulnerability.
CVE-2019-1003095 1 Jenkins 1 Perfecto Mobile 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Perfecto Mobile Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10357 2 Jenkins, Redhat 2 Pipeline\, Openshift Container Platform 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Pipeline: Shared Groovy Libraries Plugin 2.14 and earlier allowed users with Overall/Read access to obtain limited information about the content of SCM repositories referenced by global libraries.
CVE-2019-1003002 2 Jenkins, Redhat 2 Pipeline\, Openshift Container Platform 2023-10-25 6.5 MEDIUM 8.8 HIGH
A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2021-21625 1 Jenkins 1 Cloudbees Aws Credentials 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some circumstances.
CVE-2020-2119 1 Jenkins 1 Azure Ad 2023-10-25 5.0 MEDIUM 5.3 MEDIUM
Jenkins Azure AD Plugin 1.1.2 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
CVE-2020-2139 1 Jenkins 1 Cobertura 2023-10-25 8.5 HIGH 6.5 MEDIUM
An arbitrary file write vulnerability in Jenkins Cobertura Plugin 1.15 and earlier allows attackers able to control the coverage report file contents to overwrite any file on the Jenkins master file system.
CVE-2019-1003053 1 Jenkins 1 Hockeyapp 2023-10-25 4.0 MEDIUM 8.8 HIGH
Jenkins HockeyApp Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10430 1 Jenkins 1 Neuvector Vulnerability Scanner 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.