Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1608 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2302 1 Jenkins 1 Active Directory 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page.
CVE-2020-2301 1 Jenkins 1 Active Directory 2024-11-21 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
CVE-2020-2300 1 Jenkins 1 Active Directory 2024-11-21 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
CVE-2020-2299 1 Jenkins 1 Active Directory 2024-11-21 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
CVE-2020-2298 1 Jenkins 1 Nerrvana 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2297 1 Jenkins 1 Sms Notification 2024-11-21 2.1 LOW 3.3 LOW
Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2296 1 Jenkins 1 Shared Objects 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.
CVE-2020-2293 1 Jenkins 1 Persona 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller.
CVE-2020-2292 1 Jenkins 1 Release 2024-11-21 3.5 LOW 5.4 MEDIUM
Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.
CVE-2020-2291 1 Jenkins 1 Couchdb-statistics 2024-11-21 2.1 LOW 3.3 LOW
Jenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2020-2290 1 Jenkins 1 Active Choices 2024-11-21 3.5 LOW 5.4 MEDIUM
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2020-2289 1 Jenkins 1 Active Choices 2024-11-21 3.5 LOW 5.4 MEDIUM
Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2020-2288 1 Jenkins 1 Audit Trail 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
CVE-2020-2287 1 Jenkins 1 Audit Trail 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
CVE-2020-2286 1 Jenkins 1 Role-based Authorization Strategy 2024-11-21 6.8 MEDIUM 8.8 HIGH
Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.
CVE-2020-2285 1 Jenkins 1 Liquibase Runner 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Liquibase Runner Plugin 1.4.7 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2020-2284 1 Jenkins 1 Liquibase Runner 2024-11-21 5.5 MEDIUM 7.1 HIGH
Jenkins Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2283 1 Jenkins 1 Liquibase Runner 2024-11-21 3.5 LOW 5.4 MEDIUM
Jenkins Liquibase Runner Plugin 1.4.5 and earlier does not escape changeset contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control changeset files evaluated by the plugin.
CVE-2020-2282 1 Jenkins 1 Implied Labels 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Jenkins Implied Labels Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to configure the plugin.
CVE-2020-2281 1 Jenkins 1 Lockable Resources 2024-11-21 5.8 MEDIUM 5.4 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources.