Show filters
288 Total Results
Displaying 61-70 of 288
Sort by:
Attacker Value
Unknown

CVE-2023-27902

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents.
Attacker Value
Unknown

CVE-2023-27901

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
Attacker Value
Unknown

CVE-2023-27900

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service.
Attacker Value
Unknown

CVE-2023-27899

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.
Attacker Value
Unknown

CVE-2023-27898

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances.
Attacker Value
Unknown

CVE-2022-41224

Disclosure Date: September 21, 2022 (last updated October 25, 2023)
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.
Attacker Value
Unknown

CVE-2022-2048

Disclosure Date: July 07, 2022 (last updated October 07, 2023)
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
Attacker Value
Unknown

CVE-2022-34175

Disclosure Date: June 23, 2022 (last updated October 25, 2023)
Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view.
Attacker Value
Unknown

CVE-2022-34174

Disclosure Date: June 23, 2022 (last updated October 25, 2023)
In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.
Attacker Value
Unknown

CVE-2022-34173

Disclosure Date: June 23, 2022 (last updated November 03, 2023)
In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.