Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jenkins vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-50769
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and previous versions allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials ...
Jenkins Nexus Platform
NA
CVE-2023-50770
Jenkins OpenId Connect Authentication Plugin 2.6 and previous versions stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of tha...
Jenkins Openid
NA
CVE-2023-50771
Jenkins OpenId Connect Authentication Plugin 2.6 and previous versions improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing malicious users to perform phishing attacks.
Jenkins Openid
NA
CVE-2023-50772
Jenkins Dingding JSON Pusher Plugin 2.0 and previous versions stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Jenkins Dingding Json Pusher
NA
CVE-2023-50773
Jenkins Dingding JSON Pusher Plugin 2.0 and previous versions does not mask access tokens displayed on the job configuration form, increasing the potential for malicious users to observe and capture them.
Jenkins Dingding Json Pusher
NA
CVE-2023-50774
A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and previous versions allows malicious users to delete arbitrary files on the Jenkins controller file system.
Jenkins Html Resource 1.02
Jenkins Html Resource 1.01
NA
CVE-2023-50775
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and previous versions allows malicious users to copy jobs.
Jenkins Deployment Dashboard
NA
CVE-2023-50776
Jenkins PaaSLane Estimate Plugin 1.0.4 and previous versions stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Jenkins Paaslane Estimate
NA
CVE-2023-50777
Jenkins PaaSLane Estimate Plugin 1.0.4 and previous versions does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for malicious users to observe and capture them.
Jenkins Paaslane Estimate
NA
CVE-2023-50778
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and previous versions allows malicious users to connect to an attacker-specified URL using an attacker-specified token.
Jenkins Paaslane Estimate
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-17519
open redirect
CVE-2024-21683
cache poisoning
CVE-2021-47524
CVE-2021-47521
CVE-2024-5229
CVE-2021-47560
local
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »