Total
998 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2247 | 1 Jenkins | 1 Klocwork Analysis | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Klocwork Analysis Plugin 2020.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2245 | 1 Jenkins | 1 Valgrind | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Valgrind Plugin 0.28 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2178 | 1 Jenkins | 1 Parasoft Findings | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2171 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2144 | 1 Jenkins | 1 Rundeck | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Rundeck Plugin 3.6.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2138 | 1 Jenkins | 1 Cobertura | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2120 | 1 Jenkins | 1 Fitnesse | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins FitNesse Plugin 1.30 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2115 | 1 Jenkins | 1 Nunit | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins NUnit Plugin 0.25 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2108 | 1 Jenkins | 1 Websphere Deployer | 2023-10-25 | 6.5 MEDIUM | 7.6 HIGH |
Jenkins WebSphere Deployer Plugin 1.6.1 and earlier does not configure the XML parser to prevent XXE attacks which can be exploited by a user with Job/Configure permissions. | |||||
CVE-2020-2092 | 1 Jenkins | 1 Robot Framework | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Robot Framework Plugin 2.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing users with Job/Configure to have Jenkins parse crafted XML documents. | |||||
CVE-2019-16549 | 1 Jenkins | 1 Maven | 2023-10-25 | 6.8 MEDIUM | 8.1 HIGH |
Jenkins Maven Release Plugin 0.16.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks, allowing man-in-the-middle attackers to have Jenkins parse crafted XML documents. | |||||
CVE-2019-10466 | 1 Jenkins | 1 360 Fireline | 2023-10-25 | 5.5 MEDIUM | 8.1 HIGH |
An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks. | |||||
CVE-2019-10337 | 1 Jenkins | 1 Token Macro | 2023-10-25 | 5.0 MEDIUM | 7.5 HIGH |
An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks. | |||||
CVE-2019-10327 | 1 Jenkins | 1 Pipeline Maven Integration | 2023-10-25 | 5.5 MEDIUM | 8.1 HIGH |
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks. | |||||
CVE-2019-10309 | 1 Jenkins | 1 Self-organizing Swarm Modules | 2023-10-25 | 4.8 MEDIUM | 9.3 CRITICAL |
Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing unauthorized attackers on the same network to read arbitrary files from Swarm clients. | |||||
CVE-2019-1003015 | 1 Jenkins | 1 Job Import | 2023-10-25 | 6.4 MEDIUM | 9.1 CRITICAL |
An XML external entity processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc. | |||||
CVE-2023-45727 | 1 Northgrid | 1 Proself | 2023-10-25 | N/A | 7.5 HIGH |
Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker. | |||||
CVE-2022-28890 | 1 Apache | 1 Jena | 2023-10-25 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities. | |||||
CVE-2022-32755 | 1 Ibm | 3 Security Directory Server, Security Directory Suite, Security Verify Directory | 2023-10-18 | N/A | 9.1 CRITICAL |
IBM Security Directory Server 6.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 228505. | |||||
CVE-2020-26513 | 1 Intland | 1 Codebeamer | 2023-10-18 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. The ReqIF XML data, used by the codebeamer ALM application to import projects, is parsed by insecurely configured software components, which can be abused for XML External Entity Attacks. |