Latest CVE Feed
-
6.5
MEDIUMCVE-2021-21634
Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.... Read more
Affected Products : jabber_\(xmpp\)_notifier_and_control- EPSS Score: %0.05
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21633
A cross-site request forgery (CSRF) vulnerability in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins.... Read more
Affected Products : owasp_dependency-track- EPSS Score: %0.07
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21632
A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins.... Read more
Affected Products : owasp_dependency-track- EPSS Score: %0.05
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21631
Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.... Read more
Affected Products : cloud_statistics- EPSS Score: %0.03
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21630
Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : extra_columns- EPSS Score: %1.25
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21629
A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters.... Read more
Affected Products : build_with_parameters- EPSS Score: %0.07
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21628
Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : build_with_parameters- EPSS Score: %1.26
- Published: Mar. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21627
A cross-site request forgery (CSRF) vulnerability in Jenkins Libvirt Agents Plugin 1.9.0 and earlier allows attackers to stop hypervisor domains.... Read more
Affected Products : libvirt_agents- EPSS Score: %0.07
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21626
Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether at... Read more
Affected Products : warnings_next_generation- EPSS Score: %0.03
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21625
Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some ... Read more
Affected Products : cloudbees_aws_credentials- EPSS Score: %0.03
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21624
An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.... Read more
Affected Products : role-based_authorization_strategy- EPSS Score: %0.03
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21623
An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.... Read more
Affected Products : matrix_authorization_strategy- EPSS Score: %0.08
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21622
Jenkins Artifact Repository Parameter Plugin 1.0.0 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : artifact_repository_parameter- EPSS Score: %0.16
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-21621
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configur... Read more
Affected Products : support_core- EPSS Score: %0.09
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21620
A cross-site request forgery (CSRF) vulnerability in Jenkins Claim Plugin 2.18.1 and earlier allows attackers to change claims.... Read more
Affected Products : claim- EPSS Score: %0.31
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21619
Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security real... Read more
Affected Products : claim- EPSS Score: %0.15
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21618
Jenkins Repository Connector Plugin 2.0.2 and earlier does not escape parameter names and descriptions for past builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.... Read more
Affected Products : repository_connector- EPSS Score: %0.98
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21617
A cross-site request forgery (CSRF) vulnerability in Jenkins Configuration Slicing Plugin 1.51 and earlier allows attackers to apply different slice configurations.... Read more
Affected Products : configuration_slicing- EPSS Score: %0.07
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
4.6
MEDIUMCVE-2021-21616
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.... Read more
Affected Products : active_choices- EPSS Score: %2.28
- Published: Feb. 24, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-21615
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.... Read more
Affected Products : jenkins- EPSS Score: %0.41
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024