Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Total 1608 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10291 1 Jenkins 1 Netsparker Cloud Scan 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10290 1 Jenkins 1 Netsparker Cloud Scan 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-10289 1 Jenkins 1 Netsparker Cloud Scan 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers to initiate a connection to an attacker-specified server.
CVE-2019-10288 1 Jenkins 1 Jabber Server 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10287 1 Jenkins 1 Youtrack-plugin 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins youtrack-plugin Plugin 0.7.1 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10286 1 Jenkins 1 Deployhub 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins DeployHub Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10285 1 Jenkins 1 Minio Storage 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Minio Storage Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10284 1 Jenkins 1 Diawi Upload 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Diawi Upload Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10283 1 Jenkins 1 Mabl 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10282 1 Jenkins 1 Klaros-testmanagement 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10281 1 Jenkins 1 Relution Enterprise Appstore Publisher 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10280 1 Jenkins 1 Assembla Auth 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10279 1 Jenkins 1 Jenkins-reviewbot 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-10278 1 Jenkins 1 Jenkins-reviewbot 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.
CVE-2019-10277 1 Jenkins 1 Starteam 2024-11-21 4.0 MEDIUM 8.8 HIGH
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-1010241 1 Jenkins 1 Credentials Binding 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job.
CVE-2019-1003099 1 Jenkins 1 Openid 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-1003098 1 Jenkins 1 Openid 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.
CVE-2019-1003097 1 Jenkins 1 Crowd Integration 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-1003096 1 Jenkins 1 Testfairy 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.