Latest CVE Feed
-
5.3
MEDIUMCVE-2021-21621
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configur... Read more
Affected Products : support_core- EPSS Score: %0.09
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21620
A cross-site request forgery (CSRF) vulnerability in Jenkins Claim Plugin 2.18.1 and earlier allows attackers to change claims.... Read more
Affected Products : claim- EPSS Score: %0.31
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21619
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security real... Read more
Affected Products : claim- EPSS Score: %0.15
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21618
Jenkins Repository Connector Plugin 2.0.2 and earlier does not escape parameter names and descriptions for past builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.... Read more
Affected Products : repository_connector- EPSS Score: %0.98
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21617
A cross-site request forgery (CSRF) vulnerability in Jenkins Configuration Slicing Plugin 1.51 and earlier allows attackers to apply different slice configurations.... Read more
Affected Products : configuration_slicing- EPSS Score: %0.07
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
4.6
MEDIUMCVE-2021-21616
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : active_choices- EPSS Score: %2.28
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-21615
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.... Read more
Affected Products : jenkins- EPSS Score: %0.41
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-21614
Jenkins Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.... Read more
Affected Products : bumblebee_hp_alm- EPSS Score: %0.01
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-21613
Jenkins TICS Plugin 2020.3.0.6 and earlier does not escape TICS service responses, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control TICS service response content.... Read more
Affected Products : tics- EPSS Score: %0.24
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-21612
Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.... Read more
Affected Products : tracetronic_ecu-test- EPSS Score: %0.03
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21611
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs... Read more
Affected Products : jenkins- EPSS Score: %0.30
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-21610
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering a formatted preview of markup passed as a query parameter, resulting in a reflected cross-site scripting (XSS) vulnerability if the configured mar... Read more
Affected Products : jenkins- EPSS Score: %0.31
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-21609
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.... Read more
Affected Products : jenkins- EPSS Score: %0.05
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21608
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels.... Read more
Affected Products : jenkins- EPSS Score: %0.34
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21607
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.... Read more
Affected Products : jenkins- EPSS Score: %0.26
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21606
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.... Read more
Affected Products : jenkins- EPSS Score: %0.08
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
8.0
HIGHCVE-2021-21605
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.... Read more
Affected Products : jenkins- EPSS Score: %0.42
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
8.0
HIGHCVE-2021-21604
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an... Read more
Affected Products : jenkins- EPSS Score: %1.25
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21603
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability.... Read more
Affected Products : jenkins- EPSS Score: %0.30
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21602
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.... Read more
Affected Products : jenkins- EPSS Score: %1.12
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024