Filtered by vendor Jenkins
Subscriptions
Filtered by product Extended Choice Parameter
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-29038 | 1 Jenkins | 1 Extended Choice Parameter | 2024-08-03 | 5.4 Medium |
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | ||||
CVE-2022-27203 | 1 Jenkins | 1 Extended Choice Parameter | 2024-08-03 | 6.5 Medium |
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Item/Configure permission to read values from arbitrary JSON and Java properties files on the Jenkins controller. | ||||
CVE-2022-27204 | 1 Jenkins | 1 Extended Choice Parameter | 2024-08-03 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers to connect to an attacker-specified URL. | ||||
CVE-2022-27202 | 1 Jenkins | 1 Extended Choice Parameter | 2024-08-03 | 5.4 Medium |
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | ||||
CVE-2022-27205 | 1 Jenkins | 1 Extended Choice Parameter | 2024-08-03 | 4.3 Medium |
A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. |
Page 1 of 1.