Filtered by vendor Jenkins
Subscriptions
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-30522 | 1 Jenkins | 1 Fogbugz | 2023-10-24 | 4.3 Medium |
A missing permission check in Jenkins Fogbugz Plugin 2.2.17 and earlier allows attackers with Item/Read permission to trigger builds of jobs specified in a 'jobname' request parameter. | ||||
CVE-2023-30521 | 1 Jenkins | 1 Assembla Merge Request Builder | 2023-10-24 | 5.3 Medium |
A missing permission check in Jenkins Assembla merge request builder Plugin 1.1.13 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository. | ||||
CVE-2023-30520 | 1 Jenkins | 1 Quay.io Trigger | 2023-10-24 | 5.4 Medium |
Jenkins Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes for repository homepage URLs submitted via Quay.io trigger webhooks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Quay.io trigger webhook payloads. | ||||
CVE-2023-30519 | 1 Jenkins | 1 Quay.io Trigger | 2023-10-24 | 5.3 Medium |
A missing permission check in Jenkins Quay.io trigger Plugin 0.1 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository. | ||||
CVE-2023-30518 | 1 Jenkins | 1 Thycotic Secret Server | 2023-10-24 | 4.3 Medium |
A missing permission check in Jenkins Thycotic Secret Server Plugin 1.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | ||||
CVE-2023-30517 | 1 Jenkins | 1 Neuvector Vulnerability Scanner | 2023-10-24 | 5.3 Medium |
Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server. | ||||
CVE-2023-30516 | 1 Jenkins | 1 Image Tag Parameter | 2023-10-24 | 6.5 Medium |
Jenkins Image Tag Parameter Plugin 2.0 improperly introduces an option to opt out of SSL/TLS certificate validation when connecting to Docker registries, resulting in job configurations using Image Tag Parameters that were created before 2.0 having SSL/TLS certificate validation disabled by default. | ||||
CVE-2023-30515 | 1 Jenkins | 1 Thycotic Devops Secrets Vault | 2023-10-24 | 7.5 High |
Jenkins Thycotic DevOps Secrets Vault Plugin 1.0.0 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | ||||
CVE-2023-30514 | 1 Jenkins | 1 Azure Key Vault | 2023-10-24 | 7.5 High |
Jenkins Azure Key Vault Plugin 187.va_cd5fecd198a_ and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | ||||
CVE-2023-30513 | 1 Jenkins | 1 Kubernetes | 2023-10-24 | 7.5 High |
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | ||||
CVE-2023-28685 | 1 Jenkins | 1 Absint A3 | 2023-10-24 | 7.1 High |
Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2023-28684 | 1 Jenkins | 1 Remote-jobs-view | 2023-10-24 | 6.5 Medium |
Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2023-28683 | 1 Jenkins | 1 Phabricator Differential | 2023-10-24 | 8.2 High |
Jenkins Phabricator Differential Plugin 2.1.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2023-28682 | 1 Jenkins | 1 Performance Publisher | 2023-10-24 | 8.2 High |
Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2023-28681 | 1 Jenkins | 1 Visual Studio Code Metrics | 2023-10-24 | 8.2 High |
Jenkins Visual Studio Code Metrics Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2023-28680 | 1 Jenkins | 1 Crap4j | 2023-10-24 | 7.5 High |
Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2023-28679 | 1 Jenkins | 1 Mashup Portlets | 2023-10-24 | 5.4 Medium |
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. | ||||
CVE-2023-28678 | 1 Jenkins | 1 Cppcheck | 2023-10-24 | 5.4 Medium |
Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents. | ||||
CVE-2023-28677 | 1 Jenkins | 1 Convert To Pipeline | 2023-10-24 | 9.8 Critical |
Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin. | ||||
CVE-2023-28676 | 1 Jenkins | 1 Convert To Pipeline | 2023-10-24 | 8.8 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier allows attackers to create a Pipeline based on a Freestyle project, potentially leading to remote code execution (RCE). |