Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1608 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-16562 1 Jenkins 1 Buildgraph-view 2024-11-21 3.5 LOW 5.4 MEDIUM
Jenkins buildgraph-view Plugin 1.8 and earlier does not escape the description of builds shown in its view, resulting in a stored XSS vulnerability exploitable by users able to change build descriptions.
CVE-2019-16561 1 Jenkins 1 Websphere Deployer 2024-11-21 5.5 MEDIUM 7.1 HIGH
Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM.
CVE-2019-16560 1 Jenkins 1 Websphere Deployer 2024-11-21 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.
CVE-2019-16559 1 Jenkins 1 Websphere Deployer 2024-11-21 5.5 MEDIUM 5.4 MEDIUM
A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.
CVE-2019-16558 1 Jenkins 1 Spira Importer 2024-11-21 6.4 MEDIUM 8.2 HIGH
Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM.
CVE-2019-16557 1 Jenkins 1 Redgate Sql Change Automation 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Redgate SQL Change Automation Plugin 2.0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-16556 1 Jenkins 1 Rundeck 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Rundeck Plugin 3.6.5 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-16555 1 Jenkins 1 Build Failure Analyzer 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process.
CVE-2019-16554 1 Jenkins 1 Build Failure Analyzer 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression.
CVE-2019-16553 1 Jenkins 1 Build Failure Analyzer 2024-11-21 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers to have Jenkins evaluate a computationally expensive regular expression.
CVE-2019-16552 1 Jenkins 1 Gerrit Trigger 2024-11-21 5.5 MEDIUM 5.4 MEDIUM
A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master.
CVE-2019-16551 1 Jenkins 1 Gerrit Trigger 2024-11-21 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials.
CVE-2019-16550 1 Jenkins 1 Maven 2024-11-21 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.
CVE-2019-16549 1 Jenkins 1 Maven 2024-11-21 6.8 MEDIUM 8.1 HIGH
Jenkins Maven Release Plugin 0.16.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks, allowing man-in-the-middle attackers to have Jenkins parse crafted XML documents.
CVE-2019-16548 1 Jenkins 1 Google Compute Engine 2024-11-21 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin 4.1.1 and earlier in ComputeEngineCloud#doProvision could be used to provision new agents.
CVE-2019-16547 1 Jenkins 1 Google Compute Engine 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment.
CVE-2019-16546 1 Jenkins 1 Google Compute Engine 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
Jenkins Google Compute Engine Plugin 4.1.1 and earlier does not verify SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks.
CVE-2019-16543 1 Jenkins 1 Spira Importer 2024-11-21 2.1 LOW 5.5 MEDIUM
Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-16542 1 Jenkins 1 Anchore Container Image Scanner 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-16541 1 Jenkins 1 Jira 2024-11-21 6.5 MEDIUM 9.9 CRITICAL
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.