Latest CVE Feed
-
4.3
MEDIUMCVE-2021-21641
A cross-site request forgery (CSRF) vulnerability in Jenkins promoted builds Plugin 3.9 and earlier allows attackers to to promote builds.... Read more
Affected Products : promoted_builds- EPSS Score: %0.14
- Published: Apr. 07, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21640
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.... Read more
Affected Products : jenkins- EPSS Score: %0.15
- Published: Apr. 07, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21639
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with ... Read more
Affected Products : jenkins- EPSS Score: %0.13
- Published: Apr. 07, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21638
A cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cre... Read more
Affected Products : team_foundation_server- EPSS Score: %0.07
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21637
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturi... Read more
Affected Products : team_foundation_server- EPSS Score: %0.05
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21636
A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.... Read more
Affected Products : team_foundation_server- EPSS Score: %0.03
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21635
Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : rest_list_parameter- EPSS Score: %0.20
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21634
Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.... Read more
Affected Products : jabber_\(xmpp\)_notifier_and_control- EPSS Score: %0.05
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21633
A cross-site request forgery (CSRF) vulnerability in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins.... Read more
Affected Products : owasp_dependency-track- EPSS Score: %0.07
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21632
A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins.... Read more
Affected Products : owasp_dependency-track- EPSS Score: %0.05
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21631
Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.... Read more
Affected Products : cloud_statistics- EPSS Score: %0.03
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21630
Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : extra_columns- EPSS Score: %1.25
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21629
A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters.... Read more
Affected Products : build_with_parameters- EPSS Score: %0.07
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21628
Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : build_with_parameters- EPSS Score: %1.26
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21627
A cross-site request forgery (CSRF) vulnerability in Jenkins Libvirt Agents Plugin 1.9.0 and earlier allows attackers to stop hypervisor domains.... Read more
Affected Products : libvirt_agents- EPSS Score: %0.07
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21626
Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether at... Read more
Affected Products : warnings_next_generation- EPSS Score: %0.03
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21625
Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some ... Read more
Affected Products : cloudbees_aws_credentials- EPSS Score: %0.03
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21624
An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.... Read more
Affected Products : role-based_authorization_strategy- EPSS Score: %0.03
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21623
An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.... Read more
Affected Products : matrix_authorization_strategy- EPSS Score: %0.08
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21622
Jenkins Artifact Repository Parameter Plugin 1.0.0 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : artifact_repository_parameter- EPSS Score: %0.16
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024