Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1603 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-21632 1 Jenkins 1 Owasp Dependency-track 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins.
CVE-2021-21631 1 Jenkins 1 Cloud Statistics 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.
CVE-2021-21626 1 Jenkins 1 Warnings Next Generation 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
CVE-2021-21625 1 Jenkins 1 Cloudbees Aws Credentials 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some circumstances.
CVE-2021-21624 1 Jenkins 1 Role-based Authorization Strategy 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
CVE-2021-21623 1 Jenkins 1 Matrix Authorization Strategy 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
CVE-2021-21621 1 Jenkins 1 Support Core 2023-10-25 5.0 MEDIUM 5.3 MEDIUM
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configurations.
CVE-2021-21615 1 Jenkins 1 Jenkins 2023-10-25 3.5 LOW 5.3 MEDIUM
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
CVE-2021-21614 1 Jenkins 1 Bumblebee Hp Alm 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2021-21612 1 Jenkins 1 Tracetronic Ecu-test 2023-10-25 2.1 LOW 5.5 MEDIUM
Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2021-21609 1 Jenkins 1 Jenkins 2023-10-25 5.0 MEDIUM 5.3 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.
CVE-2021-21607 1 Jenkins 1 Jenkins 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.
CVE-2021-21606 1 Jenkins 1 Jenkins 2023-10-25 4.0 MEDIUM 4.3 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.
CVE-2021-21605 1 Jenkins 1 Jenkins 2023-10-25 6.0 MEDIUM 8.0 HIGH
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.
CVE-2021-21604 1 Jenkins 1 Jenkins 2023-10-25 6.0 MEDIUM 8.0 HIGH
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.
CVE-2021-21602 1 Jenkins 1 Jenkins 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
CVE-2020-2324 1 Jenkins 1 Cvs 2023-10-25 5.0 MEDIUM 7.5 HIGH
Jenkins CVS Plugin 2.16 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2320 1 Jenkins 1 Installation Manager Tool 2023-10-25 10.0 HIGH 9.8 CRITICAL
Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.
CVE-2020-2319 1 Jenkins 1 Vmware Lab Manager Slaves 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier stores a password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2318 1 Jenkins 1 Mail Commander 2023-10-25 4.0 MEDIUM 6.5 MEDIUM
Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.