Filtered by vendor Jenkins
Subscribe
Total
1395 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2185 | 1 Jenkins | 1 Amazon Ec2 | 2020-05-11 | 6.8 MEDIUM | 5.6 MEDIUM |
Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks. | |||||
CVE-2020-2184 | 1 Jenkins | 1 Current Versions Systems | 2020-05-11 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery vulnerability in Jenkins CVS Plugin 2.15 and earlier allows attackers to create and manipulate tags, and to connect to an attacker-specified URL. | |||||
CVE-2020-2186 | 1 Jenkins | 1 Amazon Ec2 | 2020-05-08 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier allows attackers to provision instances. | |||||
CVE-2020-2189 | 1 Jenkins | 1 Source Code Management Filter Jervis | 2020-05-07 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2177 | 1 Jenkins | 1 Copr | 2020-04-29 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Copr Plugin 0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2180 | 1 Jenkins | 1 Amazon Web Services Serverless Application Model | 2020-04-28 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2179 | 1 Jenkins | 1 Yaml Axis | 2020-04-27 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2178 | 1 Jenkins | 1 Parasoft Findings | 2020-04-27 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2174 | 1 Jenkins | 1 Awseb Deployment | 2020-04-07 | 4.3 MEDIUM | 6.1 MEDIUM |
Jenkins AWSEB Deployment Plugin 0.3.19 and earlier does not escape various values printed as part of form validation output, resulting in a reflected cross-site scripting vulnerability. | |||||
CVE-2020-2172 | 1 Jenkins | 1 Code Coverage Api | 2020-04-07 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2176 | 1 Jenkins | 1 Usemango Runner | 2020-04-07 | 3.5 LOW | 5.4 MEDIUM |
Multiple form validation endpoints in Jenkins useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service. | |||||
CVE-2020-2173 | 1 Jenkins | 1 Gatling | 2020-04-07 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Gatling Plugin 1.2.7 and earlier prevents Content-Security-Policy headers from being set for Gatling reports served by the plugin, resulting in an XSS vulnerability exploitable by users able to change report content. | |||||
CVE-2020-2175 | 1 Jenkins | 1 Fitnesse | 2020-04-07 | 3.5 LOW | 5.4 MEDIUM |
Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin. | |||||
CVE-2020-2160 | 1 Jenkins | 1 Jenkins | 2020-03-30 | 6.8 MEDIUM | 8.8 HIGH |
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL. | |||||
CVE-2020-2161 | 1 Jenkins | 1 Jenkins | 2020-03-30 | 3.5 LOW | 5.4 MEDIUM |
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels. | |||||
CVE-2020-2166 | 1 Jenkins | 1 Pipeline\ | 2020-03-30 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2167 | 1 Jenkins | 1 Openshift Pipeline | 2020-03-30 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2168 | 1 Jenkins | 1 Azure Container Service | 2020-03-30 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2171 | 1 Jenkins | 1 Rapiddeploy | 2020-03-30 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2169 | 1 Jenkins | 1 Queue Cleanup | 2020-03-27 | 4.3 MEDIUM | 6.1 MEDIUM |
A form validation endpoint in Jenkins Queue cleanup Plugin 1.3 and earlier does not properly escape a query parameter displayed in an error message, resulting in a reflected XSS vulnerability. |