Filtered by vendor Jenkins
Subscriptions
Total
1645 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-16572 | 1 Jenkins | 1 Weibo | 2024-11-21 | 5.5 Medium |
Jenkins Weibo Plugin 1.0.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | ||||
CVE-2019-16571 | 1 Jenkins | 1 Rapiddeploy | 2024-11-21 | 4.3 Medium |
A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server. | ||||
CVE-2019-16570 | 1 Jenkins | 1 Rapiddeploy | 2024-11-21 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server. | ||||
CVE-2019-16569 | 1 Jenkins | 1 Mantis | 2024-11-21 | 4.3 Medium |
A cross-site request forgery vulnerability in Jenkins Mantis Plugin 0.26 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials. | ||||
CVE-2019-16568 | 1 Jenkins | 1 Sctmexecutor | 2024-11-21 | 5.3 Medium |
Jenkins SCTMExecutor Plugin 2.2 and earlier transmits previously configured service credentials in plain text as part of the global configuration, as well as individual jobs' configurations. | ||||
CVE-2019-16567 | 1 Jenkins | 1 Team Concert | 2024-11-21 | 4.3 Medium |
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | ||||
CVE-2019-16566 | 1 Jenkins | 1 Team Concert | 2024-11-21 | 6.5 Medium |
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-16565 | 1 Jenkins | 1 Team Concert | 2024-11-21 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2019-16564 | 1 Jenkins | 1 Pipeline Aggregator View | 2024-11-21 | 5.4 Medium |
Jenkins Pipeline Aggregator View Plugin 1.8 and earlier does not escape information shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to affects view content such as job display name or pipeline stage names. | ||||
CVE-2019-16563 | 1 Jenkins | 1 Mission Control | 2024-11-21 | 5.4 Medium |
Jenkins Mission Control Plugin 0.9.16 and earlier does not escape job display names and build names shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to change these properties. | ||||
CVE-2019-16562 | 1 Jenkins | 1 Buildgraph-view | 2024-11-21 | 5.4 Medium |
Jenkins buildgraph-view Plugin 1.8 and earlier does not escape the description of builds shown in its view, resulting in a stored XSS vulnerability exploitable by users able to change build descriptions. | ||||
CVE-2019-16561 | 1 Jenkins | 1 Websphere Deployer | 2024-11-21 | 7.1 High |
Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM. | ||||
CVE-2019-16560 | 1 Jenkins | 1 Websphere Deployer | 2024-11-21 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system. | ||||
CVE-2019-16559 | 1 Jenkins | 1 Websphere Deployer | 2024-11-21 | 5.4 Medium |
A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system. | ||||
CVE-2019-16558 | 1 Jenkins | 1 Spira Importer | 2024-11-21 | 8.2 High |
Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM. | ||||
CVE-2019-16557 | 1 Jenkins | 1 Redgate Sql Change Automation | 2024-11-21 | 6.5 Medium |
Jenkins Redgate SQL Change Automation Plugin 2.0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-16556 | 1 Jenkins | 1 Rundeck | 2024-11-21 | 6.5 Medium |
Jenkins Rundeck Plugin 3.6.5 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | ||||
CVE-2019-16555 | 1 Jenkins | 1 Build Failure Analyzer | 2024-11-21 | 6.5 Medium |
A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process. | ||||
CVE-2019-16554 | 1 Jenkins | 1 Build Failure Analyzer | 2024-11-21 | 4.3 Medium |
A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression. | ||||
CVE-2019-16553 | 1 Jenkins | 1 Build Failure Analyzer | 2024-11-21 | 8.8 High |
A cross-site request forgery vulnerability in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers to have Jenkins evaluate a computationally expensive regular expression. |