Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cloudbees jenkins vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-11350
CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page.
Cloudbees Jenkins Operations Center 2.150.2.3
9.8
CVSSv3
CVE-2017-1000353
Jenkins versions 2.56 and previous versions as well as 2.46.1 LTS and previous versions are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed malicious users to transfer a serialized Java `SignedObject` object t...
Jenkins Jenkins
Oracle Communications Cloud Native Core Automated Test Suite 1.9.0
1 EDB exploit
5 Github repositories
1 Article
8.8
CVSSv3
CVE-2020-2093
A cross-site request forgery vulnerability in Jenkins Health Advisor by CloudBees Plugin 3.0 and previous versions allows malicious users to send an email with fixed content to an attacker-specified recipient.
Jenkins Health Advisor By Cloudbees
8.8
CVSSv3
CVE-2018-1000866
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and previous versions in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers w...
Jenkins Pipeline\\ Groovy
Redhat Openshift Container Platform 3.11
8.1
CVSSv3
CVE-2023-46654
Jenkins CloudBees CD Plugin 1.1.32 and previous versions follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitr...
Jenkins Cloudbees Cd
8
CVSSv3
CVE-2022-27198
A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and previous versions allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.
Jenkins Cloudbees Aws Credentials 1.32
Jenkins Cloudbees Aws Credentials
7.5
CVSSv3
CVE-2022-45385
A missing permission check in Jenkins CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and previous versions allows unauthenticated malicious users to trigger builds of jobs corresponding to the attacker-specified repository.
Jenkins Cloudbees Docker Hub\\/registry Notification
7.5
CVSSv3
CVE-2012-0785
Hash collision attack vulnerability in Jenkins prior to 1.447, Jenkins LTS prior to 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x prior to 1.424.2.1 and 1.400.x prior to 1.400.0.11 could allow remote malicious users to cause a considerable CPU load, aka "the Hash DoS ...
Cloudbees Jenkins
Jenkins Jenkins
1 Github repository
7.5
CVSSv3
CVE-2015-1809
XML external entity (XXE) vulnerability in CloudBees Jenkins prior to 1.600 and LTS prior to 1.596.1 allows remote malicious users to read arbitrary XML files via an XPath query.
Jenkins Cloudbees
7.5
CVSSv3
CVE-2015-1811
XML external entity (XXE) vulnerability in CloudBees Jenkins prior to 1.600 and LTS prior to 1.596.1 allows remote malicious users to read arbitrary XML files via a crafted XML document.
Jenkins Cloudbees
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »