Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Jenkins Subscribe
Total 1395 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2185 1 Jenkins 1 Amazon Ec2 2020-05-11 6.8 MEDIUM 5.6 MEDIUM
Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks.
CVE-2020-2184 1 Jenkins 1 Current Versions Systems 2020-05-11 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery vulnerability in Jenkins CVS Plugin 2.15 and earlier allows attackers to create and manipulate tags, and to connect to an attacker-specified URL.
CVE-2020-2186 1 Jenkins 1 Amazon Ec2 2020-05-08 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier allows attackers to provision instances.
CVE-2020-2189 1 Jenkins 1 Source Code Management Filter Jervis 2020-05-07 6.5 MEDIUM 8.8 HIGH
Jenkins SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2177 1 Jenkins 1 Copr 2020-04-29 4.0 MEDIUM 4.3 MEDIUM
Jenkins Copr Plugin 0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2020-2180 1 Jenkins 1 Amazon Web Services Serverless Application Model 2020-04-28 6.5 MEDIUM 8.8 HIGH
Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2179 1 Jenkins 1 Yaml Axis 2020-04-27 6.5 MEDIUM 8.8 HIGH
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2178 1 Jenkins 1 Parasoft Findings 2020-04-27 5.5 MEDIUM 7.1 HIGH
Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2174 1 Jenkins 1 Awseb Deployment 2020-04-07 4.3 MEDIUM 6.1 MEDIUM
Jenkins AWSEB Deployment Plugin 0.3.19 and earlier does not escape various values printed as part of form validation output, resulting in a reflected cross-site scripting vulnerability.
CVE-2020-2172 1 Jenkins 1 Code Coverage Api 2020-04-07 4.0 MEDIUM 6.5 MEDIUM
Jenkins Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2176 1 Jenkins 1 Usemango Runner 2020-04-07 3.5 LOW 5.4 MEDIUM
Multiple form validation endpoints in Jenkins useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.
CVE-2020-2173 1 Jenkins 1 Gatling 2020-04-07 3.5 LOW 5.4 MEDIUM
Jenkins Gatling Plugin 1.2.7 and earlier prevents Content-Security-Policy headers from being set for Gatling reports served by the plugin, resulting in an XSS vulnerability exploitable by users able to change report content.
CVE-2020-2175 1 Jenkins 1 Fitnesse 2020-04-07 3.5 LOW 5.4 MEDIUM
Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.
CVE-2020-2160 1 Jenkins 1 Jenkins 2020-03-30 6.8 MEDIUM 8.8 HIGH
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.
CVE-2020-2161 1 Jenkins 1 Jenkins 2020-03-30 3.5 LOW 5.4 MEDIUM
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels.
CVE-2020-2166 1 Jenkins 1 Pipeline\ 2020-03-30 6.5 MEDIUM 8.8 HIGH
Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2167 1 Jenkins 1 Openshift Pipeline 2020-03-30 6.5 MEDIUM 8.8 HIGH
Jenkins OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2168 1 Jenkins 1 Azure Container Service 2020-03-30 6.5 MEDIUM 8.8 HIGH
Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
CVE-2020-2171 1 Jenkins 1 Rapiddeploy 2020-03-30 6.5 MEDIUM 8.8 HIGH
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2169 1 Jenkins 1 Queue Cleanup 2020-03-27 4.3 MEDIUM 6.1 MEDIUM
A form validation endpoint in Jenkins Queue cleanup Plugin 1.3 and earlier does not properly escape a query parameter displayed in an error message, resulting in a reflected XSS vulnerability.