Filtered by vendor Jenkins
Subscriptions
Total
1622 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-46688 | 1 Jenkins | 1 Sonar Gerrit | 2024-11-21 | 6.5 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins Sonar Gerrit Plugin 377.v8f3808963dc5 and earlier allows attackers to have Jenkins connect to Gerrit servers (previously configured by Jenkins administrators) using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins. | ||||
CVE-2022-46687 | 1 Jenkins | 1 Spring Config | 2024-11-21 | 5.4 Medium |
Jenkins Spring Config Plugin 2.0.0 and earlier does not escape build display names shown on the Spring Config view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to change build display names. | ||||
CVE-2022-46686 | 1 Jenkins | 1 Custom Build Properties | 2024-11-21 | 5.4 Medium |
Jenkins Custom Build Properties Plugin 2.79.vc095ccc85094 and earlier does not escape property values and build display names on the Custom Build Properties and Build Summary pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set or change these values. | ||||
CVE-2022-46684 | 1 Jenkins | 1 Checkmarx | 2024-11-21 | 5.4 Medium |
Jenkins Checkmarx Plugin 2022.3.3 and earlier does not escape values returned from the Checkmarx service API before inserting them into HTML reports, resulting in a stored cross-site scripting (XSS) vulnerability. | ||||
CVE-2022-46683 | 1 Jenkins | 1 Google Login | 2024-11-21 | 6.1 Medium |
Jenkins Google Login Plugin 1.4 through 1.6 (both inclusive) improperly determines that a redirect URL after login is legitimately pointing to Jenkins. | ||||
CVE-2022-46682 | 1 Jenkins | 1 Plot | 2024-11-21 | 9.8 Critical |
Jenkins Plot Plugin 2.1.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-45401 | 1 Jenkins | 1 Associated Files | 2024-11-21 | 5.4 Medium |
Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | ||||
CVE-2022-45400 | 1 Jenkins | 1 Japex | 2024-11-21 | 9.8 Critical |
Jenkins JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-45399 | 1 Jenkins | 1 Cluster Statistics | 2024-11-21 | 4.3 Medium |
A missing permission check in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics. | ||||
CVE-2022-45398 | 1 Jenkins | 1 Cluster Statistics | 2024-11-21 | 4.3 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics. | ||||
CVE-2022-45397 | 1 Jenkins | 1 Osf Builder Suite \ | 2024-11-21 | 9.8 Critical |
Jenkins OSF Builder Suite : : XML Linter Plugin 1.0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-45396 | 1 Jenkins | 1 Sourcemonitor | 2024-11-21 | 9.8 Critical |
Jenkins SourceMonitor Plugin 0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-45395 | 1 Jenkins | 1 Cccc | 2024-11-21 | 9.8 Critical |
Jenkins CCCC Plugin 0.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-45394 | 1 Jenkins | 1 Delete Log | 2024-11-21 | 4.3 Medium |
A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows attackers with Item/Read permission to delete build logs. | ||||
CVE-2022-45393 | 1 Jenkins | 1 Delete Log | 2024-11-21 | 3.5 Low |
A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs. | ||||
CVE-2022-45392 | 1 Jenkins | 1 Ns-nd Integration Performance Publisher | 2024-11-21 | 6.5 Medium |
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system. | ||||
CVE-2022-45391 | 1 Jenkins | 1 Ns-nd Integration Performance Publisher | 2024-11-21 | 7.5 High |
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM. | ||||
CVE-2022-45390 | 1 Jenkins | 1 Loader.io | 2024-11-21 | 4.3 Medium |
A missing permission check in Jenkins loader.io Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | ||||
CVE-2022-45389 | 1 Jenkins | 1 Xp-dev | 2024-11-21 | 5.3 Medium |
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository. | ||||
CVE-2022-45388 | 1 Jenkins | 1 Config Rotator | 2024-11-21 | 7.5 High |
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. |