Filtered by vendor Jenkins
Subscriptions
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-2103 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 5.4 Medium |
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page. | ||||
CVE-2020-2102 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 5.3 Medium |
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier used a non-constant time comparison function when validating an HMAC. | ||||
CVE-2020-2101 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 5.3 Medium |
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret. | ||||
CVE-2020-2100 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 5.8 Medium |
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848. | ||||
CVE-2020-2099 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 8.6 High |
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents. | ||||
CVE-2020-2098 | 1 Jenkins | 1 Sounds | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Sounds Plugin 0.5 and earlier allows attacker to execute arbitrary OS commands as the OS user account running Jenkins. | ||||
CVE-2020-2097 | 1 Jenkins | 1 Sounds | 2023-10-25 | 8.8 High |
Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins. | ||||
CVE-2020-2095 | 1 Jenkins | 1 Redgate Sql Change Automation | 2023-10-25 | 4.3 Medium |
Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2020-2094 | 1 Jenkins | 1 Health Advisor By Cloudbees | 2023-10-25 | 4.3 Medium |
A missing permission check in Jenkins Health Advisor by CloudBees Plugin 3.0 and earlier allows attackers with Overall/Read permission to send a fixed email to an attacker-specific recipient. | ||||
CVE-2020-2093 | 1 Jenkins | 1 Health Advisor By Cloudbees | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Health Advisor by CloudBees Plugin 3.0 and earlier allows attackers to send an email with fixed content to an attacker-specified recipient. | ||||
CVE-2020-2092 | 1 Jenkins | 1 Robot Framework | 2023-10-25 | 8.8 High |
Jenkins Robot Framework Plugin 2.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing users with Job/Configure to have Jenkins parse crafted XML documents. | ||||
CVE-2020-2091 | 1 Jenkins | 1 Amazon Ec2 | 2023-10-25 | 8.1 High |
A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. | ||||
CVE-2020-2090 | 1 Jenkins | 1 Amazon Ec2 | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. | ||||
CVE-2019-16576 | 1 Jenkins | 1 Alauda Kubernetes Support | 2023-10-25 | 6.5 Medium |
A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins. | ||||
CVE-2019-16575 | 1 Jenkins | 1 Alauda Kubernetes Support | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins. | ||||
CVE-2019-16574 | 1 Jenkins | 1 Alauda Devops Pipeline | 2023-10-25 | 6.5 Medium |
A missing permission check in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-16573 | 1 Jenkins | 1 Alauda Devops Pipeline | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-16572 | 1 Jenkins | 1 Weibo | 2023-10-25 | 5.5 Medium |
Jenkins Weibo Plugin 1.0.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-16571 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 4.3 Medium |
A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server. | ||||
CVE-2019-16570 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server. |