Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Jenkins Subscribe
Filtered by product Pipeline Maven Integration
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2256 1 Jenkins 1 Pipeline Maven Integration 2020-09-16 3.5 LOW 5.4 MEDIUM
Jenkins Pipeline Maven Integration Plugin 3.9.2 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2020-2235 1 Jenkins 1 Pipeline Maven Integration 2020-08-13 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows attackers to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
CVE-2020-2234 1 Jenkins 1 Pipeline Maven Integration 2020-08-13 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
CVE-2020-2233 1 Jenkins 1 Pipeline Maven Integration 2020-08-13 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-10327 1 Jenkins 1 Pipeline Maven Integration 2019-06-03 5.5 MEDIUM 8.1 HIGH
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.