Filtered by vendor Jenkins
Subscribe
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2177 | 1 Jenkins | 1 Copr | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Copr Plugin 0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2174 | 1 Jenkins | 1 Awseb Deployment | 2023-10-25 | 4.3 MEDIUM | 6.1 MEDIUM |
Jenkins AWSEB Deployment Plugin 0.3.19 and earlier does not escape various values printed as part of form validation output, resulting in a reflected cross-site scripting vulnerability. | |||||
CVE-2020-2172 | 1 Jenkins | 1 Code Coverage Api | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2171 | 1 Jenkins | 1 Rapiddeploy | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-2168 | 1 Jenkins | 1 Azure Container Service | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2167 | 1 Jenkins | 1 Openshift Pipeline | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2166 | 1 Jenkins | 1 Pipeline\ | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2160 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 6.8 MEDIUM | 8.8 HIGH |
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL. | |||||
CVE-2020-2159 | 1 Jenkins | 1 Cryptomove | 2023-10-25 | 9.0 HIGH | 8.8 HIGH |
Jenkins CryptoMove Plugin 0.1.33 and earlier allows attackers with Job/Configure access to execute arbitrary OS commands on the Jenkins master as the OS user account running Jenkins. | |||||
CVE-2020-2158 | 1 Jenkins | 1 Literate | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2157 | 1 Jenkins | 1 Skytap Cloud Ci | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2020-2156 | 1 Jenkins | 1 Deployhub | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins DeployHub Plugin 8.0.14 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2020-2155 | 1 Jenkins | 1 Openshift Deployer | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2020-2154 | 1 Jenkins | 1 Zephyr For Jira Test Management | 2023-10-25 | 2.1 LOW | 5.5 MEDIUM |
Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier stores its credentials in plain text in a global configuration file on the Jenkins master file system. | |||||
CVE-2020-2153 | 1 Jenkins | 1 Backlog | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Backlog Plugin 2.4 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. | |||||
CVE-2020-2152 | 1 Jenkins | 1 Subversion Release Manager | 2023-10-25 | 4.3 MEDIUM | 6.1 MEDIUM |
Jenkins Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation, resulting in a reflected cross-site scripting vulnerability. | |||||
CVE-2020-2151 | 1 Jenkins | 1 Quality Gates | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins Quality Gates Plugin 2.5 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2020-2150 | 1 Jenkins | 1 Sonar Quality Gates | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins Sonar Quality Gates Plugin 1.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2020-2149 | 1 Jenkins | 1 Repository Connector | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins Repository Connector Plugin 1.2.6 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2020-2148 | 1 Jenkins | 1 Mac | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials. |