Filtered by vendor Jenkins
Subscribe
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-21662 | 1 Jenkins | 1 Xebialabs Xl Deploy | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins. | |||||
CVE-2021-21661 | 1 Jenkins | 1 Kubernetes | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2021-21659 | 1 Jenkins | 1 Urltrigger | 2023-10-25 | 5.5 MEDIUM | 8.1 HIGH |
Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2021-21658 | 1 Jenkins | 1 Nuget | 2023-10-25 | 6.4 MEDIUM | 9.1 CRITICAL |
Jenkins Nuget Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2021-21657 | 1 Jenkins | 1 Filesystem Trigger | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2021-21656 | 1 Jenkins | 1 Xcode Integration | 2023-10-25 | 5.5 MEDIUM | 7.1 HIGH |
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2021-21654 | 1 Jenkins | 1 P4 | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password. | |||||
CVE-2021-21653 | 1 Jenkins | 1 Xray - Test Management For Jira | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2021-21651 | 1 Jenkins | 1 S3 Publisher | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles. | |||||
CVE-2021-21650 | 1 Jenkins | 1 S3 Publisher | 2023-10-25 | 3.5 LOW | 4.3 MEDIUM |
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. | |||||
CVE-2021-21647 | 1 Jenkins | 1 Cloudbees Cd | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins CloudBees CD Plugin 1.1.21 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Item/Read permission to schedule builds of projects without having Item/Build permission. | |||||
CVE-2021-21646 | 1 Jenkins | 1 Templating Engine | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Templating Engine Plugin 2.1 and earlier does not protect its pipeline configurations using Script Security Plugin, allowing attackers with Job/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM. | |||||
CVE-2021-21645 | 1 Jenkins | 1 Config File Provider | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints, attackers with Overall/Read permission to enumerate configuration file IDs. | |||||
CVE-2021-21643 | 1 Jenkins | 1 Config File Provider | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins. | |||||
CVE-2021-21642 | 1 Jenkins | 1 Config File Provider | 2023-10-25 | 5.5 MEDIUM | 8.1 HIGH |
Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2021-21640 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names. | |||||
CVE-2021-21639 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type. | |||||
CVE-2021-21637 | 1 Jenkins | 1 Team Foundation Server | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2021-21636 | 1 Jenkins | 1 Team Foundation Server | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins. | |||||
CVE-2021-21634 | 1 Jenkins | 1 Jabber \(xmpp\) Notifier And Control | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. |