Filtered by vendor Jenkins
Subscribe
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2315 | 1 Jenkins | 1 Visualworks Store | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Visualworks Store Plugin 1.1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2314 | 1 Jenkins | 1 Appspider | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2020-2313 | 1 Jenkins | 1 Azure Key Vault | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Azure Key Vault Plugin 2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2020-2312 | 1 Jenkins | 1 Sqlplus Script Runner | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins SQLPlus Script Runner Plugin 2.0.12 and earlier does not mask a password provided as command line argument in build logs. | |||||
CVE-2020-2311 | 1 Jenkins | 1 Aws Global Configuration | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins AWS Global Configuration Plugin 1.5 and earlier allows attackers with Overall/Read permission to replace the global AWS configuration. | |||||
CVE-2020-2310 | 1 Jenkins | 1 Ansible | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Missing permission checks in Jenkins Ansible Plugin 1.0 and earlier allow attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2020-2309 | 1 Jenkins | 1 Kubernetes | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2020-2308 | 1 Jenkins | 1 Kubernetes | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names. | |||||
CVE-2020-2307 | 1 Jenkins | 1 Kubernetes | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables. | |||||
CVE-2020-2306 | 1 Jenkins | 1 Mercurial | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Mercurial Plugin 2.11 and earlier allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations. | |||||
CVE-2020-2305 | 1 Jenkins | 1 Mercurial | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Mercurial Plugin 2.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2304 | 1 Jenkins | 1 Subversion | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2302 | 1 Jenkins | 1 Active Directory | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page. | |||||
CVE-2020-2301 | 1 Jenkins | 1 Active Directory | 2023-10-25 | 7.5 HIGH | 9.8 CRITICAL |
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode. | |||||
CVE-2020-2300 | 1 Jenkins | 1 Active Directory | 2023-10-25 | 7.5 HIGH | 9.8 CRITICAL |
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server. | |||||
CVE-2020-2299 | 1 Jenkins | 1 Active Directory | 2023-10-25 | 7.5 HIGH | 9.8 CRITICAL |
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password. | |||||
CVE-2020-2298 | 1 Jenkins | 1 Nerrvana | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2297 | 1 Jenkins | 1 Sms Notification | 2023-10-25 | 2.1 LOW | 3.3 LOW |
Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2020-2293 | 1 Jenkins | 1 Persona | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2020-2291 | 1 Jenkins | 1 Couchdb-statistics | 2023-10-25 | 2.1 LOW | 3.3 LOW |
Jenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. |