Filtered by vendor Jenkins
Subscribe
Total
1395 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-20614 | 2 Jenkins, Oracle | 2 Mailer, Communications Cloud Native Core Automated Test Suite | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname. | |||||
CVE-2022-20618 | 1 Jenkins | 1 Bitbucket Branch Source | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2022-20616 | 1 Jenkins | 1 Credentials Binding | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file. | |||||
CVE-2022-20620 | 1 Jenkins | 1 Ssh Agent | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
Missing permission checks in Jenkins SSH Agent Plugin 1.23 and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2022-27199 | 1 Jenkins | 1 Cloudbees Aws Credentials | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token. | |||||
CVE-2022-27205 | 1 Jenkins | 1 Extended Choice Parameter | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | |||||
CVE-2022-27215 | 1 Jenkins | 1 Release Helper | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2022-28137 | 1 Jenkins | 1 Jiratestresultreporter | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2022-34796 | 1 Jenkins | 1 Deployment Dashboard | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2022-28147 | 1 Jenkins | 1 Continuous Integration With Toad Edge | 2022-10-17 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | |||||
CVE-2022-34200 | 1 Jenkins | 1 Convertigo Mobile Platform | 2022-10-07 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL. | |||||
CVE-2020-2159 | 1 Jenkins | 1 Cryptomove | 2022-10-07 | 9.0 HIGH | 8.8 HIGH |
Jenkins CryptoMove Plugin 0.1.33 and earlier allows attackers with Job/Configure access to execute arbitrary OS commands on the Jenkins master as the OS user account running Jenkins. | |||||
CVE-2020-2152 | 1 Jenkins | 1 Subversion Release Manager | 2022-10-07 | 4.3 MEDIUM | 6.1 MEDIUM |
Jenkins Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation, resulting in a reflected cross-site scripting vulnerability. | |||||
CVE-2020-2229 | 1 Jenkins | 1 Jenkins | 2022-10-05 | 3.5 LOW | 5.4 MEDIUM |
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability. | |||||
CVE-2020-2230 | 1 Jenkins | 1 Jenkins | 2022-10-05 | 3.5 LOW | 5.4 MEDIUM |
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission. | |||||
CVE-2022-41255 | 1 Jenkins | 1 Cons3rt | 2022-09-22 | N/A | 6.5 MEDIUM |
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2022-41254 | 1 Jenkins | 1 Cons3rt | 2022-09-22 | N/A | 6.5 MEDIUM |
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2022-41253 | 1 Jenkins | 1 Cons3rt | 2022-09-22 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins CONS3RT Plugin 1.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2022-41252 | 1 Jenkins | 1 Cons3rt | 2022-09-22 | N/A | 4.3 MEDIUM |
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allows users with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins. | |||||
CVE-2022-41251 | 1 Jenkins | 1 Apprenda | 2022-09-22 | N/A | 4.3 MEDIUM |
A missing permission check in Jenkins Apprenda Plugin 2.2.0 and earlier allows users with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. |