Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jenkins deployment dashboard vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-50775
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions allows malicious users to copy jobs.
Jenkins Deployment Dashboard
4.3
CVSSv2
CVE-2022-34797
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions allows malicious users to connect to an attacker-specified HTTP URL using attacker-specified credentials.
Jenkins Deployment Dashboard
3.5
CVSSv2
CVE-2022-34798
Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.
Jenkins Deployment Dashboard
3.5
CVSSv2
CVE-2022-34795
Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions does not escape environment names on its Deployment Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
Jenkins Deployment Dashboard
4
CVSSv2
CVE-2022-34796
A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Jenkins Deployment Dashboard
4
CVSSv2
CVE-2022-34799
Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Jenkins Deployment Dashboard
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started