Filtered by vendor Jenkins
Subscribe
Total
1608 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-2280 | 1 Jenkins | 1 Warnings | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Warnings Plugin 5.0.1 and earlier allows attackers to execute arbitrary code. | |||||
CVE-2020-2279 | 1 Jenkins | 1 Script Security | 2024-11-21 | 6.5 MEDIUM | 9.9 CRITICAL |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM. | |||||
CVE-2020-2278 | 1 Jenkins | 1 Storable Configs | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other '.xml' file on the Jenkins controller with a job config.xml file's content. | |||||
CVE-2020-2277 | 1 Jenkins | 1 Storable Configs | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Storable Configs Plugin 1.0 and earlier allows users with Job/Read permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2020-2276 | 1 Jenkins | 1 Selection Tasks | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as. | |||||
CVE-2020-2275 | 1 Jenkins | 1 Copy Data To Workspace | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Copy data to workspace Plugin 1.0 and earlier does not limit which directories can be copied from the Jenkins controller to job workspaces, allowing attackers with Job/Configure permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2020-2274 | 1 Jenkins | 1 Elastest | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | |||||
CVE-2020-2273 | 1 Jenkins | 1 Elastest | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2020-2272 | 1 Jenkins | 1 Elastest | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2020-2271 | 1 Jenkins | 1 Locked Files Report | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Locked Files Report Plugin 1.6 and earlier does not escape locked files' names in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2020-2270 | 1 Jenkins | 1 Clearcase Release | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins ClearCase Release Plugin 0.3 and earlier does not escape the composite baseline in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2020-2269 | 1 Jenkins | 1 Chosen-views-tabbar | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views. | |||||
CVE-2020-2268 | 1 Jenkins | 1 Mongodb | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins MongoDB Plugin 1.3 and earlier allows attackers to gain access to some metadata of any arbitrary files on the Jenkins controller. | |||||
CVE-2020-2267 | 1 Jenkins | 1 Mongodb | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins MongoDB Plugin 1.3 and earlier allows attackers with Overall/Read permission to gain access to some metadata of any arbitrary files on the Jenkins controller. | |||||
CVE-2020-2266 | 1 Jenkins | 1 Description Column | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Description Column Plugin 1.3 and earlier does not escape the job description in the column tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2020-2265 | 1 Jenkins | 1 Coverage\/complexity Scatter Plot | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. | |||||
CVE-2020-2264 | 1 Jenkins | 1 Custom Job Icon | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Custom Job Icon Plugin 0.2 and earlier does not escape the job descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2020-2263 | 1 Jenkins | 1 Radiator View | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Radiator View Plugin 1.29 and earlier does not escape the full name of the jobs in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2020-2262 | 1 Jenkins | 1 Android Lint | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Android Lint Plugin 2.6 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. | |||||
CVE-2020-2261 | 1 Jenkins | 1 Perfecto | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Perfecto Plugin 1.17 and earlier executes a command on the Jenkins controller, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller |