Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jenkins fortify on demand vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-10449
Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Jenkins Fortify On Demand
4.3
CVSSv3
CVE-2020-2202
A missing permission check in Jenkins Fortify on Demand Plugin 6.0.0 and previous versions in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
Jenkins Fortify On Demand
4.3
CVSSv3
CVE-2020-2203
A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and previous versions allows malicious users to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.
Jenkins Fortify On Demand
5.4
CVSSv3
CVE-2020-2204
A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and previous versions allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.
Jenkins Fortify On Demand
6.5
CVSSv3
CVE-2019-1003047
A missing permission check in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and previous versions allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
Jenkins Fortify On Demand Uploader
6.5
CVSSv3
CVE-2019-1003046
A cross-site request forgery vulnerability in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and previous versions allows malicious users to initiate a connection to an attacker-specified server.
Jenkins Fortify On Demand Uploader
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started