Filtered by vendor Jenkins
Subscribe
Total
1608 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10291 | 1 Jenkins | 1 Netsparker Cloud Scan | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10290 | 1 Jenkins | 1 Netsparker Cloud Scan | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | |||||
CVE-2019-10289 | 1 Jenkins | 1 Netsparker Cloud Scan | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2019-10288 | 1 Jenkins | 1 Jabber Server | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10287 | 1 Jenkins | 1 Youtrack-plugin | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins youtrack-plugin Plugin 0.7.1 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10286 | 1 Jenkins | 1 Deployhub | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins DeployHub Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10285 | 1 Jenkins | 1 Minio Storage | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Minio Storage Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10284 | 1 Jenkins | 1 Diawi Upload | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Diawi Upload Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10283 | 1 Jenkins | 1 Mabl | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10282 | 1 Jenkins | 1 Klaros-testmanagement | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10281 | 1 Jenkins | 1 Relution Enterprise Appstore Publisher | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10280 | 1 Jenkins | 1 Assembla Auth | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-10279 | 1 Jenkins | 1 Jenkins-reviewbot | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | |||||
CVE-2019-10278 | 1 Jenkins | 1 Jenkins-reviewbot | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2019-10277 | 1 Jenkins | 1 Starteam | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1010241 | 1 Jenkins | 1 Credentials Binding | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job. | |||||
CVE-2019-1003099 | 1 Jenkins | 1 Openid | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | |||||
CVE-2019-1003098 | 1 Jenkins | 1 Openid | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
A cross-site request forgery vulnerability in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server. | |||||
CVE-2019-1003097 | 1 Jenkins | 1 Crowd Integration | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | |||||
CVE-2019-1003096 | 1 Jenkins | 1 Testfairy | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. |