Filtered by vendor Jenkins
Subscriptions
Filtered by product Embeddable Build Status
Subscriptions
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-34179 | 1 Jenkins | 1 Embeddable Build Status | 2023-11-03 | 7.5 High |
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system. | ||||
CVE-2022-34180 | 1 Jenkins | 1 Embeddable Build Status | 2023-11-03 | 7.5 High |
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build. | ||||
CVE-2022-34178 | 1 Jenkins | 1 Embeddable Build Status | 2023-11-03 | 6.1 Medium |
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability. | ||||
CVE-2019-10346 | 1 Jenkins | 1 Embeddable Build Status | 2023-10-25 | 6.1 Medium |
A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin. |
Page 1 of 1.