Filtered by vendor Jenkins
Subscriptions
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-16546 | 1 Jenkins | 1 Google Compute Engine | 2023-10-25 | 5.9 Medium |
Jenkins Google Compute Engine Plugin 4.1.1 and earlier does not verify SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks. | ||||
CVE-2019-16543 | 1 Jenkins | 1 Spira Importer | 2023-10-25 | 5.5 Medium |
Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-16542 | 1 Jenkins | 1 Anchore Container Image Scanner | 2023-10-25 | 6.5 Medium |
Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-16541 | 1 Jenkins | 1 Jira | 2023-10-25 | 9.9 Critical |
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope. | ||||
CVE-2019-16540 | 1 Jenkins | 1 Support Core | 2023-10-25 | 6.5 Medium |
A path traversal vulnerability in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete arbitrary files on the Jenkins master. | ||||
CVE-2019-16539 | 1 Jenkins | 1 Support Core | 2023-10-25 | 6.5 Medium |
A missing permission check in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete support bundles. | ||||
CVE-2019-16538 | 1 Jenkins | 1 Script Security | 2023-10-25 | 8.8 High |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts. | ||||
CVE-2019-10476 | 1 Jenkins | 1 Zulip | 2023-10-25 | 7.8 High |
Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | ||||
CVE-2019-10475 | 1 Jenkins | 1 Build-metrics | 2023-10-25 | 6.1 Medium |
A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin. | ||||
CVE-2019-10474 | 1 Jenkins | 1 Global Post Script | 2023-10-25 | 4.3 Medium |
A missing permission check in Jenkins Global Post Script Plugin in allowed users with Overall/Read access to list the scripts available to the plugin stored on the Jenkins master file system. | ||||
CVE-2019-10473 | 1 Jenkins | 1 Libvirt Slaves | 2023-10-25 | 4.3 Medium |
A missing permission check in Jenkins Libvirt Slaves Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2019-10472 | 1 Jenkins | 1 Libvirt Slaves | 2023-10-25 | 6.5 Medium |
A missing permission check in Jenkins Libvirt Slaves Plugin allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10471 | 1 Jenkins | 1 Libvirt Slaves | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Libvirt Slaves Plugin allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10470 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 6.5 Medium |
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2019-10469 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 6.5 Medium |
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10468 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10467 | 1 Jenkins | 1 Sonar Gerrit | 2023-10-25 | 6.5 Medium |
Jenkins Sonar Gerrit Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-10466 | 1 Jenkins | 1 360 Fireline | 2023-10-25 | 8.1 High |
An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks. | ||||
CVE-2019-10465 | 1 Jenkins | 1 Deploy Weblogic | 2023-10-25 | 4.3 Medium |
A missing permission check in Jenkins Deploy WebLogic Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system. | ||||
CVE-2019-10464 | 1 Jenkins | 1 Deploy Weblogic | 2023-10-25 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Deploy WebLogic Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system. |