Filtered by vendor Jenkins
Subscriptions
Total
1606 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-10336 | 1 Jenkins | 1 Electricflow | 2024-08-04 | N/A |
A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin. | ||||
CVE-2019-10314 | 1 Jenkins | 1 Koji | 2024-08-04 | N/A |
Jenkins Koji Plugin disables SSL/TLS and hostname verification globally for the Jenkins master JVM. | ||||
CVE-2019-10386 | 1 Jenkins | 1 Xl Testview | 2024-08-04 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins XL TestView Plugin 1.2.0 and earlier in XLTestView.XLTestDescriptor#doTestConnection allows users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-10371 | 1 Jenkins | 1 Gitlab Oauth | 2024-08-04 | 7.5 High |
A session fixation vulnerability in Jenkins Gitlab Authentication Plugin 1.4 and earlier in GitLabSecurityRealm.java allows unauthorized attackers to impersonate another user if they can control the pre-authentication session. | ||||
CVE-2019-10363 | 1 Jenkins | 1 Configuration As Code | 2024-08-04 | 4.9 Medium |
Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form. | ||||
CVE-2019-10374 | 1 Jenkins | 1 Pegdown Formatter | 2024-08-04 | 5.4 Medium |
A stored cross-site scripting vulnerability in Jenkins PegDown Formatter Plugin 1.3 and earlier allows attackers able to edit descriptions and other fields rendered using the configured markup formatter to insert links with the javascript scheme into the Jenkins UI. | ||||
CVE-2019-10359 | 1 Jenkins | 1 M2release | 2024-08-04 | 6.3 Medium |
A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options. | ||||
CVE-2019-10337 | 2 Jenkins, Redhat | 2 Token Macro, Openshift | 2024-08-04 | N/A |
An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks. | ||||
CVE-2019-10342 | 1 Jenkins | 1 Docker | 2024-08-04 | 4.3 Medium |
A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2019-10315 | 1 Jenkins | 1 Github Authentication | 2024-08-04 | N/A |
Jenkins GitHub Authentication Plugin 0.31 and earlier did not use the state parameter of OAuth to prevent CSRF. | ||||
CVE-2019-10308 | 1 Jenkins | 1 Static Analysis Utilities | 2024-08-04 | 6.5 Medium |
A missing permission check in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers with Overall/Read permission to change the per-job default graph configuration for all users. | ||||
CVE-2019-10358 | 1 Jenkins | 1 Maven | 2024-08-04 | 6.5 Medium |
Jenkins Maven Integration Plugin 3.3 and earlier did not apply build log decorators to module builds, potentially revealing sensitive build variables in the build log. | ||||
CVE-2019-10352 | 2 Jenkins, Redhat | 2 Jenkins, Openshift | 2024-08-04 | N/A |
A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build. | ||||
CVE-2019-10307 | 1 Jenkins | 1 Static Analysis Utilities | 2024-08-04 | N/A |
A cross-site request forgery vulnerability in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers to change the per-job default graph configuration for all users. | ||||
CVE-2019-10326 | 1 Jenkins | 1 Warnings Next Generation | 2024-08-04 | N/A |
A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds. | ||||
CVE-2019-10350 | 1 Jenkins | 1 Port Allocator | 2024-08-04 | 8.8 High |
Jenkins Port Allocator Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-10327 | 1 Jenkins | 1 Pipeline Maven Integration | 2024-08-04 | N/A |
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks. | ||||
CVE-2019-10349 | 1 Jenkins | 1 Dependency Graph Viewer | 2024-08-04 | 5.4 Medium |
A stored cross site scripting vulnerability in Jenkins Dependency Graph Viewer Plugin 0.13 and earlier allowed attackers able to configure jobs in Jenkins to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins. | ||||
CVE-2019-10354 | 2 Jenkins, Redhat | 3 Jenkins, Openshift, Openshift Container Platform | 2024-08-04 | 4.3 Medium |
A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information. | ||||
CVE-2019-10340 | 1 Jenkins | 1 Docker | 2024-08-04 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. |