Filtered by vendor Jenkins
Subscriptions
Total
1606 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-41252 | 1 Jenkins | 1 Cons3rt | 2024-08-03 | 4.3 Medium |
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allows users with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2022-41237 | 1 Jenkins | 1 Dotci | 2024-08-03 | 9.8 Critical |
Jenkins DotCi Plugin 2.40.00 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | ||||
CVE-2022-38666 | 1 Jenkins | 1 Ns-nd Integration Performance Publisher | 2024-08-03 | 7.5 High |
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features. | ||||
CVE-2022-38665 | 1 Jenkins | 1 Collabnet | 2024-08-03 | 6.5 Medium |
Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | ||||
CVE-2022-38664 | 1 Jenkins | 1 Job Configuration History | 2024-08-03 | 5.4 Medium |
Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names. | ||||
CVE-2022-38663 | 1 Jenkins | 1 Git | 2024-08-03 | 6.5 Medium |
Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding. | ||||
CVE-2022-36921 | 1 Jenkins | 1 Coverity | 2024-08-03 | 8.1 High |
A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2022-36914 | 1 Jenkins | 1 Files Found Trigger | 2024-08-03 | 4.3 Medium |
Jenkins Files Found Trigger Plugin 1.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | ||||
CVE-2022-36912 | 1 Jenkins | 1 Openstack Heat | 2024-08-03 | 4.3 Medium |
A missing permission check in Jenkins Openstack Heat Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | ||||
CVE-2022-36916 | 1 Jenkins | 1 Google Cloud Backup | 2024-08-03 | 8.0 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers to request a manual backup. | ||||
CVE-2022-36896 | 1 Jenkins | 1 Compuware Source Code Download For Endevor\, Pds\, And Ispw | 2024-08-03 | 6.5 Medium |
A missing permission check in Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. | ||||
CVE-2022-36918 | 1 Jenkins | 1 Buckminster | 2024-08-03 | 4.3 Medium |
Jenkins Buckminster Plugin 1.1.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | ||||
CVE-2022-36900 | 1 Jenkins | 2 Compuware Zadviser Api, Jenkins | 2024-08-03 | 8.2 High |
Jenkins Compuware zAdviser API Plugin 1.0.3 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties. | ||||
CVE-2022-36890 | 1 Jenkins | 1 Deployer Framework | 2024-08-03 | 4.3 Medium |
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | ||||
CVE-2022-36911 | 1 Jenkins | 1 Openstack Heat | 2024-08-03 | 6.5 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins Openstack Heat Plugin 1.5 and earlier allows attackers to connect to an attacker-specified URL. | ||||
CVE-2022-36901 | 1 Jenkins | 1 Http Request | 2024-08-03 | 6.5 Medium |
Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | ||||
CVE-2022-36886 | 1 Jenkins | 1 External Monitor Job Type | 2024-08-03 | 4.3 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier allows attackers to create runs of an external job. | ||||
CVE-2022-36908 | 1 Jenkins | 1 Openshift Deployer | 2024-08-03 | 6.5 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL. | ||||
CVE-2022-36919 | 1 Jenkins | 1 Coverity | 2024-08-03 | 4.3 Medium |
A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | ||||
CVE-2022-36893 | 1 Jenkins | 1 Rpmsign-plugin | 2024-08-03 | 4.3 Medium |
Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. |