Filtered by vendor Jenkins
Subscriptions
Total
1606 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-10470 | 1 Jenkins | 1 Kubernetes Ci | 2024-08-04 | 6.5 Medium |
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2019-10462 | 1 Jenkins | 1 Dynatrace Application Monitoring | 2024-08-04 | 8.1 High |
A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials. | ||||
CVE-2019-10465 | 1 Jenkins | 1 Deploy Weblogic | 2024-08-04 | 4.3 Medium |
A missing permission check in Jenkins Deploy WebLogic Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system. | ||||
CVE-2019-10460 | 1 Jenkins | 1 Bitbucket Oauth | 2024-08-04 | 7.8 High |
Jenkins Bitbucket OAuth Plugin 0.9 and earlier stored credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | ||||
CVE-2019-10445 | 1 Jenkins | 1 Google Kubernetes Engine | 2024-08-04 | 4.3 Medium |
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID. | ||||
CVE-2019-10459 | 1 Jenkins | 1 Mattermost Notification | 2024-08-04 | 6.5 Medium |
Jenkins Mattermost Notification Plugin 2.7.0 and earlier stored webhook URLs containing a secret token unencrypted in its global configuration file and job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-10458 | 1 Jenkins | 1 Puppet Enterprise Pipeline | 2024-08-04 | 9.9 Critical |
Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code. | ||||
CVE-2019-10461 | 1 Jenkins | 1 Dynatrace Application Monitoring | 2024-08-04 | 7.8 High |
Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | ||||
CVE-2019-10463 | 1 Jenkins | 1 Dynatrace Application Monitoring | 2024-08-04 | 6.5 Medium |
A missing permission check in Jenkins Dynatrace Application Monitoring Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | ||||
CVE-2019-10446 | 1 Jenkins | 1 Cadence Vmanager | 2024-08-04 | 8.2 High |
Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM. | ||||
CVE-2019-10454 | 1 Jenkins | 1 Rundeck | 2024-08-04 | 4.3 Medium |
A cross-site request forgery vulnerability in Jenkins Rundeck Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials. | ||||
CVE-2019-10474 | 1 Jenkins | 1 Global Post Script | 2024-08-04 | 4.3 Medium |
A missing permission check in Jenkins Global Post Script Plugin in allowed users with Overall/Read access to list the scripts available to the plugin stored on the Jenkins master file system. | ||||
CVE-2019-10437 | 1 Jenkins | 1 Crx Content Package Deployer | 2024-08-04 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10438 | 1 Jenkins | 1 Crx Content Package Deployer | 2024-08-04 | 6.5 Medium |
A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10455 | 1 Jenkins | 1 Rundeck | 2024-08-04 | 4.3 Medium |
A missing permission check in Jenkins Rundeck Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | ||||
CVE-2019-10451 | 1 Jenkins | 1 Soasta Cloudtest | 2024-08-04 | 4.3 Medium |
Jenkins SOASTA CloudTest Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-10473 | 1 Jenkins | 1 Libvirt Slaves | 2024-08-04 | 4.3 Medium |
A missing permission check in Jenkins Libvirt Slaves Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2019-10431 | 2 Jenkins, Redhat | 2 Script Security, Openshift | 2024-08-04 | 9.9 Critical |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts. | ||||
CVE-2019-10441 | 1 Jenkins | 1 Icescrum | 2024-08-04 | 4.3 Medium |
A cross-site request forgery vulnerability in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials. | ||||
CVE-2019-10444 | 1 Jenkins | 1 Bumblebee Hp Alm | 2024-08-04 | 6.5 Medium |
Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM. |