Filtered by vendor Jenkins
Subscriptions
Total
1606 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-1003063 | 1 Jenkins | 1 Amazon Sns Build Notifier | 2024-08-05 | 8.8 High |
Jenkins Amazon SNS Build Notifier Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003044 | 1 Jenkins | 1 Slack Notification | 2024-08-05 | N/A |
A cross-site request forgery vulnerability in Jenkins Slack Notification Plugin 2.19 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-1003073 | 1 Jenkins | 1 Vs Team Services Continuous Deployment | 2024-08-05 | 8.8 High |
Jenkins VS Team Services Continuous Deployment Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-1003070 | 1 Jenkins | 1 Veracode-scanner | 2024-08-05 | 8.8 High |
Jenkins veracode-scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003059 | 1 Jenkins | 1 Ftp Publisher | 2024-08-05 | 6.5 Medium |
A missing permission check in Jenkins FTP publisher Plugin in the FTPPublisher.DescriptorImpl#doLoginCheck method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | ||||
CVE-2019-1003064 | 1 Jenkins | 1 Aws-device-farm | 2024-08-05 | 8.8 High |
Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003056 | 1 Jenkins | 1 Websphere Deployer | 2024-08-05 | 8.8 High |
Jenkins WebSphere Deployer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-1003086 | 1 Jenkins | 1 Chef Sinatra | 2024-08-05 | N/A |
A cross-site request forgery vulnerability in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. | ||||
CVE-2019-1003060 | 1 Jenkins | 1 Official Owasp Zap | 2024-08-05 | 8.8 High |
Jenkins Official OWASP ZAP Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003068 | 1 Jenkins | 1 Vmware Vrealize Automation | 2024-08-05 | 8.8 High |
Jenkins VMware vRealize Automation Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-1003041 | 2 Jenkins, Redhat | 3 Pipeline\, Openshift, Openshift Container Platform | 2024-08-05 | 9.8 Critical |
A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin 2.64 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts. | ||||
CVE-2019-1003053 | 1 Jenkins | 1 Hockeyapp | 2024-08-05 | 8.8 High |
Jenkins HockeyApp Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-1003071 | 1 Jenkins | 1 Octopusdeploy | 2024-08-05 | 8.8 High |
Jenkins OctopusDeploy Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003069 | 1 Jenkins | 1 Aqua Security Scanner | 2024-08-05 | 8.8 High |
Jenkins Aqua Security Scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003055 | 1 Jenkins | 1 Ftp Publisher | 2024-08-05 | 8.8 High |
Jenkins FTP publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003052 | 1 Jenkins | 1 Aws Elastic Beanstalk Publisher | 2024-08-05 | 8.8 High |
Jenkins AWS Elastic Beanstalk Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003062 | 1 Jenkins | 1 Aws Cloudwatch Logs Publisher | 2024-08-05 | 8.8 High |
Jenkins AWS CloudWatch Logs Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003048 | 1 Jenkins | 1 Prqa | 2024-08-05 | 7.8 High |
A vulnerability in Jenkins PRQA Plugin 3.1.0 and earlier allows attackers with local file system access to the Jenkins home directory to obtain the unencrypted password from the plugin configuration. | ||||
CVE-2019-1003066 | 1 Jenkins | 1 Bugzilla | 2024-08-05 | 8.8 High |
Jenkins Bugzilla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-1003034 | 2 Jenkins, Redhat | 3 Job Dsl, Openshift, Openshift Container Platform | 2024-08-05 | 9.9 Critical |
A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM. |