Filtered by vendor Jenkins
Subscriptions
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-2172 | 1 Jenkins | 1 Code Coverage Api | 2023-10-25 | 6.5 Medium |
Jenkins Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2020-2171 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 8.8 High |
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2020-2168 | 1 Jenkins | 1 Azure Container Service | 2023-10-25 | 8.8 High |
Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | ||||
CVE-2020-2167 | 1 Jenkins | 1 Openshift Pipeline | 2023-10-25 | 8.8 High |
Jenkins OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | ||||
CVE-2020-2166 | 1 Jenkins | 1 Pipeline\ | 2023-10-25 | 8.8 High |
Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | ||||
CVE-2020-2160 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 8.8 High |
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL. | ||||
CVE-2020-2159 | 1 Jenkins | 1 Cryptomove | 2023-10-25 | 8.8 High |
Jenkins CryptoMove Plugin 0.1.33 and earlier allows attackers with Job/Configure access to execute arbitrary OS commands on the Jenkins master as the OS user account running Jenkins. | ||||
CVE-2020-2158 | 1 Jenkins | 1 Literate | 2023-10-25 | 8.8 High |
Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | ||||
CVE-2020-2157 | 1 Jenkins | 1 Skytap Cloud Ci | 2023-10-25 | 4.3 Medium |
Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | ||||
CVE-2020-2156 | 1 Jenkins | 1 Deployhub | 2023-10-25 | 4.3 Medium |
Jenkins DeployHub Plugin 8.0.14 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | ||||
CVE-2020-2155 | 1 Jenkins | 1 Openshift Deployer | 2023-10-25 | 5.3 Medium |
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | ||||
CVE-2020-2154 | 1 Jenkins | 1 Zephyr For Jira Test Management | 2023-10-25 | 5.5 Medium |
Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier stores its credentials in plain text in a global configuration file on the Jenkins master file system. | ||||
CVE-2020-2153 | 1 Jenkins | 1 Backlog | 2023-10-25 | 4.3 Medium |
Jenkins Backlog Plugin 2.4 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | ||||
CVE-2020-2152 | 1 Jenkins | 1 Subversion Release Manager | 2023-10-25 | 6.1 Medium |
Jenkins Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation, resulting in a reflected cross-site scripting vulnerability. | ||||
CVE-2020-2151 | 1 Jenkins | 1 Quality Gates | 2023-10-25 | 5.3 Medium |
Jenkins Quality Gates Plugin 2.5 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | ||||
CVE-2020-2150 | 1 Jenkins | 1 Sonar Quality Gates | 2023-10-25 | 5.3 Medium |
Jenkins Sonar Quality Gates Plugin 1.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | ||||
CVE-2020-2149 | 1 Jenkins | 1 Repository Connector | 2023-10-25 | 5.3 Medium |
Jenkins Repository Connector Plugin 1.2.6 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | ||||
CVE-2020-2148 | 1 Jenkins | 1 Mac | 2023-10-25 | 4.3 Medium |
A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials. | ||||
CVE-2020-2147 | 1 Jenkins | 1 Mac | 2023-10-25 | 4.3 Medium |
A cross-site request forgery vulnerability in Jenkins Mac Plugin 1.1.0 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials. | ||||
CVE-2020-2146 | 1 Jenkins | 1 Mac | 2023-10-25 | 7.4 High |
Jenkins Mac Plugin 1.1.0 and earlier does not validate SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks. |