Filtered by vendor Jenkins
Subscribe
Total
1465 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-50778 | 1 Jenkins | 1 Paaslane Estimate | 2024-02-05 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token. | |||||
CVE-2023-50767 | 1 Jenkins | 1 Nexus Platform | 2024-02-05 | N/A | 5.4 MEDIUM |
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML. | |||||
CVE-2023-50773 | 1 Jenkins | 1 Dingding Json Pusher | 2024-02-05 | N/A | 4.3 MEDIUM |
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them. | |||||
CVE-2023-49656 | 1 Jenkins | 1 Matlab | 2024-02-05 | N/A | 9.8 CRITICAL |
Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2024-23901 | 1 Jenkins | 1 Github Branch Source | 2024-02-05 | N/A | 6.5 MEDIUM |
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier unconditionally discovers projects that are shared with the configured owner group, allowing attackers to configure and share a project, resulting in a crafted Pipeline being built by Jenkins during the next scan of the group. | |||||
CVE-2023-50765 | 1 Jenkins | 1 Scriptler | 2024-02-05 | N/A | 4.3 MEDIUM |
A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID. | |||||
CVE-2023-50772 | 1 Jenkins | 1 Dingding Json Pusher | 2024-02-05 | N/A | 4.3 MEDIUM |
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | |||||
CVE-2024-23900 | 1 Jenkins | 1 Matrix Project | 2024-02-05 | N/A | 4.3 MEDIUM |
Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects, allowing attackers with Item/Configure permission to create or replace any config.xml files on the Jenkins controller file system with content not controllable by the attackers. | |||||
CVE-2023-50769 | 1 Jenkins | 1 Nexus Platform | 2024-02-05 | N/A | 4.3 MEDIUM |
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2023-37956 | 1 Jenkins | 1 Test Results Aggregator | 2024-02-05 | N/A | 6.5 MEDIUM |
A missing permission check in Jenkins Test Results Aggregator Plugin 1.2.13 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2023-39152 | 1 Jenkins | 1 Gradle | 2024-02-05 | N/A | 6.5 MEDIUM |
Always-incorrect control flow implementation in Jenkins Gradle Plugin 2.8 may result in credentials not being masked (i.e., replaced with asterisks) in the build log in some circumstances. | |||||
CVE-2023-40351 | 1 Jenkins | 1 Favorite View | 2024-02-05 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Favorite View Plugin 5.v77a_37f62782d and earlier allows attackers to add or remove views from another user's favorite views tab bar. | |||||
CVE-2023-40345 | 1 Jenkins | 1 Delphix | 2024-02-05 | N/A | 6.5 MEDIUM |
Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Overall/Read permission to access and capture credentials they are not entitled to. | |||||
CVE-2023-37962 | 1 Jenkins | 1 Benchmark Evaluator | 2024-02-05 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system. | |||||
CVE-2023-40337 | 1 Jenkins | 1 Folders | 2024-02-05 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier allows attackers to copy a view inside a folder. | |||||
CVE-2023-40349 | 1 Jenkins | 1 Gogs | 2024-02-05 | N/A | 5.3 MEDIUM |
Jenkins Gogs Plugin 1.0.15 and earlier improperly initializes an option to secure its webhook endpoint, allowing unauthenticated attackers to trigger builds of jobs. | |||||
CVE-2023-40338 | 1 Jenkins | 1 Folders | 2024-02-05 | N/A | 4.3 MEDIUM |
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier displays an error message that includes an absolute path of a log file when attempting to access the Scan Organization Folder Log if no logs are available, exposing information about the Jenkins controller file system. | |||||
CVE-2023-37954 | 1 Jenkins | 1 Rebuilder | 2024-02-05 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Rebuilder Plugin 320.v5a_0933a_e7d61 and earlier allows attackers to rebuild a previous build. | |||||
CVE-2023-39155 | 1 Jenkins | 1 Chef Identity | 2024-02-05 | N/A | 5.3 MEDIUM |
Jenkins Chef Identity Plugin 2.0.3 and earlier does not mask the user.pem key form field, increasing the potential for attackers to observe and capture it. | |||||
CVE-2023-39154 | 1 Jenkins | 1 Qualys Web App Scanning Connector | 2024-02-05 | N/A | 6.5 MEDIUM |
Incorrect permission checks in Jenkins Qualys Web App Scanning Connector Plugin 2.0.10 and earlier allow attackers with global Item/Configure permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. |