Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Jenkins Subscribe
Total 1395 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2223 1 Jenkins 1 Jenkins 2020-07-21 3.5 LOW 5.4 MEDIUM
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability.
CVE-2020-2225 1 Jenkins 1 Matrix Project 2020-07-21 3.5 LOW 5.4 MEDIUM
Jenkins Matrix Project Plugin 1.16 and earlier does not escape the axis names shown in tooltips on the overview page of builds with multiple axes, resulting in a stored cross-site scripting vulnerability.
CVE-2020-2203 1 Jenkins 1 Fortify On Demand 2020-07-16 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.
CVE-2020-2208 1 Jenkins 1 Slack Upload 2020-07-15 4.0 MEDIUM 4.3 MEDIUM
Jenkins Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2216 1 Jenkins 1 Zephyr For Jira Test Management 2020-07-15 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified username and password.
CVE-2020-2204 1 Jenkins 1 Fortify On Demand 2020-07-15 5.5 MEDIUM 5.4 MEDIUM
A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.
CVE-2020-2202 1 Jenkins 1 Fortify On Demand 2020-07-15 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Fortify on Demand Plugin 6.0.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-1003097 1 Jenkins 1 Crowd Integration 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-1003096 1 Jenkins 1 Testfairy 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-1003099 1 Jenkins 1 Openid 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003085 1 Jenkins 1 Zephyr Enterprise Test Management 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Zephyr Enterprise Test Management Plugin in the ZeeDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003083 1 Jenkins 1 Gearman 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Gearman Plugin in the GearmanPluginConfig#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003079 1 Jenkins 1 Vmware Lab Manager Slaves 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins VMware Lab Manager Slaves Plugin in the LabManager.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003093 1 Jenkins 1 Nomad 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003091 1 Jenkins 1 Soasta Cloudtest 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003087 1 Jenkins 1 Chef Sinatra 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003081 1 Jenkins 1 Openshift Deployer 2020-07-15 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2020-2110 1 Jenkins 1 Script Security 2020-07-13 6.5 MEDIUM 8.8 HIGH
Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.
CVE-2020-2109 1 Jenkins 1 Pipeline\ 2020-07-13 6.5 MEDIUM 8.8 HIGH
Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.
CVE-2019-16538 1 Jenkins 1 Script Security 2020-07-13 6.5 MEDIUM 8.8 HIGH
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.