Show filters
1,655 Total Results
Displaying 51-60 of 1,655
Sort by:
Attacker Value
Unknown
CVE-2024-28149
Disclosure Date: March 06, 2024 (last updated March 07, 2024)
Jenkins HTML Publisher Plugin 1.16 through 1.32 (both inclusive) does not properly sanitize input, allowing attackers with Item/Configure permission to implement cross-site scripting (XSS) attacks and to determine whether a path on the Jenkins controller file system exists.
0
Attacker Value
Unknown
CVE-2024-23905
Disclosure Date: January 24, 2024 (last updated January 30, 2024)
Jenkins Red Hat Dependency Analytics Plugin 0.7.1 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
0
Attacker Value
Unknown
CVE-2024-23904
Disclosure Date: January 24, 2024 (last updated January 30, 2024)
Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2024-23903
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
0
Attacker Value
Unknown
CVE-2024-23902
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL.
0
Attacker Value
Unknown
CVE-2024-23901
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier unconditionally discovers projects that are shared with the configured owner group, allowing attackers to configure and share a project, resulting in a crafted Pipeline being built by Jenkins during the next scan of the group.
0
Attacker Value
Unknown
CVE-2024-23900
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects, allowing attackers with Item/Configure permission to create or replace any config.xml files on the Jenkins controller file system with content not controllable by the attackers.
0
Attacker Value
Unknown
CVE-2024-23899
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2024-23898
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
0
Attacker Value
Unknown
CVE-2023-50779
Disclosure Date: December 13, 2023 (last updated December 19, 2023)
Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.
0