Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
configuration as code vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2018-1000609
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and previous versions in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.
Jenkins Configuration As Code 0.2
Jenkins Configuration As Code 0.3
Jenkins Configuration As Code 0.4
Jenkins Configuration As Code 0.5
Jenkins Configuration As Code 0.7
Jenkins Configuration As Code 0.1
Jenkins Configuration As Code 0.6
8.8
CVSSv3
CVE-2018-1000610
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and previous versions in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files...
Jenkins Configuration As Code 0.3
Jenkins Configuration As Code 0.4
Jenkins Configuration As Code 0.5
Jenkins Configuration As Code 0.6
Jenkins Configuration As Code 0.1
Jenkins Configuration As Code 0.2
Jenkins Configuration As Code 0.7
5.5
CVSSv3
CVE-2019-10367
Due to an incomplete fix of CVE-2019-10343, Jenkins Configuration as Code Plugin 1.26 and previous versions did not properly apply masking to some values expected to be hidden when logging the configuration being applied.
Jenkins Configuration As Code
5.3
CVSSv3
CVE-2022-23106
Jenkins Configuration as Code Plugin 1.55 and previous versions used a non-constant time comparison function when validating an authentication token allowing malicious users to use statistical methods to obtain a valid authentication token.
Jenkins Configuration As Code
4.3
CVSSv3
CVE-2019-10344
Missing permission checks in Jenkins Configuration as Code Plugin 1.24 and previous versions in various HTTP endpoints allowed users with Overall/Read access to access the generated schema and documentation for this plugin containing detailed information about installed plugins.
Jenkins Configuration As Code
5.4
CVSSv3
CVE-2019-10362
Jenkins Configuration as Code Plugin 1.24 and previous versions did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment vari...
Jenkins Configuration As Code
3.3
CVSSv3
CVE-2019-10343
Jenkins Configuration as Code Plugin 1.24 and previous versions did not properly apply masking to values expected to be hidden when logging the configuration being applied.
Jenkins Configuration As Code
5.5
CVSSv3
CVE-2019-10345
Jenkins Configuration as Code Plugin 1.20 and previous versions did not treat the proxy password as a secret to be masked when logging or encrypted for export.
Jenkins Configuration As Code
4.9
CVSSv3
CVE-2019-10363
Jenkins Configuration as Code Plugin 1.24 and previous versions did not reliably identify sensitive values expected to be exported in their encrypted form.
Jenkins Configuration As Code
NA
CVE-2000-0723
Helix GNOME Updater helix-update 0.5 and previous versions does not properly create /tmp directories, which allows local users to create empty system configuration files such as /etc/config.d/bashrc, /etc/config.d/csh.cshrc, and /etc/rc.config.
Helix Code Gnome Installer 0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »