Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2156 | 1 Jenkins | 1 Deployhub | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins DeployHub Plugin 8.0.14 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2020-2190 | 1 Jenkins | 1 Script Security | 2023-10-25 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability. | |||||
CVE-2020-2210 | 1 Jenkins | 1 Stash Branch Parameter | 2023-10-25 | 4.3 MEDIUM | 4.3 MEDIUM |
Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2021-21607 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors. | |||||
CVE-2020-2198 | 1 Jenkins | 1 Project Inheritance | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure. | |||||
CVE-2020-2091 | 1 Jenkins | 1 Amazon Ec2 | 2023-10-25 | 5.5 MEDIUM | 8.1 HIGH |
A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. | |||||
CVE-2019-16558 | 1 Jenkins | 1 Spira Importer | 2023-10-25 | 6.4 MEDIUM | 8.2 HIGH |
Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM. | |||||
CVE-2019-16538 | 1 Jenkins | 1 Script Security | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts. | |||||
CVE-2020-2099 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 7.5 HIGH | 8.6 HIGH |
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents. | |||||
CVE-2020-2204 | 1 Jenkins | 1 Fortify On Demand | 2023-10-25 | 5.5 MEDIUM | 5.4 MEDIUM |
A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs. | |||||
CVE-2021-21640 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names. | |||||
CVE-2019-1003015 | 1 Jenkins | 1 Job Import | 2023-10-25 | 6.4 MEDIUM | 9.1 CRITICAL |
An XML external entity processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc. | |||||
CVE-2019-1003044 | 1 Jenkins | 1 Slack Notification | 2023-10-25 | 2.1 LOW | 7.1 HIGH |
A cross-site request forgery vulnerability in Jenkins Slack Notification Plugin 2.19 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2019-1003078 | 1 Jenkins | 1 Vmware Lab Manager Slaves | 2023-10-25 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins VMware Lab Manager Slaves Plugin in the LabManager.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2020-2132 | 1 Jenkins | 1 Parasoft Environment Manager | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2181 | 1 Jenkins | 1 Credentials Binding | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps. | |||||
CVE-2019-10339 | 1 Jenkins | 1 Jx Resources | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
A missing permission check in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed users with Overall/Read access to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials. | |||||
CVE-2020-2282 | 1 Jenkins | 1 Implied Labels | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Implied Labels Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to configure the plugin. | |||||
CVE-2021-21621 | 1 Jenkins | 1 Support Core | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configurations. | |||||
CVE-2020-2310 | 1 Jenkins | 1 Ansible | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Missing permission checks in Jenkins Ansible Plugin 1.0 and earlier allow attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. |