Filtered by vendor Jenkins
Subscribe
Total
1395 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-34804 | 1 Jenkins | 1 Opsgenie | 2022-07-11 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins OpsGenie Plugin 1.9 and earlier transmits API keys in plain text as part of the global Jenkins configuration form and job configuration forms, potentially resulting in their exposure. | |||||
CVE-2022-34778 | 1 Jenkins | 1 Testng Results | 2022-07-11 | 3.5 LOW | 5.4 MEDIUM |
Jenkins TestNG Results Plugin 554.va4a552116332 and earlier renders the unescaped test descriptions and exception messages provided in test results if certain job-level options are set, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs or control test results. | |||||
CVE-2022-34818 | 1 Jenkins | 1 Failed Job Deactivator | 2022-07-08 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs. | |||||
CVE-2022-34817 | 1 Jenkins | 1 Failed Job Deactivator | 2022-07-08 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier allows attackers to disable jobs. | |||||
CVE-2022-34816 | 1 Jenkins | 1 Hpe Network Virtualization | 2022-07-08 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins HPE Network Virtualization Plugin 1.0 stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2022-34815 | 1 Jenkins | 1 Request Rename Or Delete | 2022-07-08 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier allows attackers to accept pending requests, thereby renaming or deleting jobs. | |||||
CVE-2022-34814 | 1 Jenkins | 1 Request Rename Or Delete | 2022-07-08 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view an administrative configuration page listing pending requests. | |||||
CVE-2022-34813 | 1 Jenkins | 1 Xpath Configuration Viewer | 2022-07-08 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to create and delete XPath expressions. | |||||
CVE-2022-34812 | 1 Jenkins | 1 Xpath Configuration Viewer | 2022-07-08 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers to create and delete XPath expressions. | |||||
CVE-2022-34810 | 1 Jenkins | 1 Rqm | 2022-07-08 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing check in Jenkins RQM Plugin 2.8 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2022-34811 | 1 Jenkins | 1 Xpath Configuration Viewer | 2022-07-08 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to access the XPath Configuration Viewer page. | |||||
CVE-2022-34809 | 1 Jenkins | 1 Rqm | 2022-07-08 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins RQM Plugin 2.8 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2022-34808 | 1 Jenkins | 1 Cisco Spark | 2022-07-08 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2022-34807 | 1 Jenkins | 1 Elasticsearch Query | 2022-07-08 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Elasticsearch Query Plugin 1.2 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2022-34777 | 1 Jenkins | 1 Gitlab | 2022-07-08 | 3.5 LOW | 5.4 MEDIUM |
Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2022-34792 | 1 Jenkins | 1 Recipe | 2022-07-08 | 6.0 MEDIUM | 8.0 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML. | |||||
CVE-2022-34791 | 1 Jenkins | 1 Validating Email Parameter | 2022-07-08 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Validating Email Parameter Plugin 1.10 and earlier does not escape the name and description of its parameter type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2022-34790 | 1 Jenkins | 1 Extreme Feedback Panel | 2022-07-08 | 3.5 LOW | 5.4 MEDIUM |
Jenkins eXtreme Feedback Panel Plugin 2.0.1 and earlier does not escape the job names used in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2022-34789 | 1 Jenkins | 1 Matrix Reloaded | 2022-07-08 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Matrix Reloaded Plugin 1.1.3 and earlier allows attackers to rebuild previous matrix builds. | |||||
CVE-2022-34787 | 1 Jenkins | 1 Project Inheritance | 2022-07-08 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Project Inheritance Plugin 21.04.03 and earlier does not escape the reason a build is blocked in tooltips, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control the reason a queue item is blocked. |