Skip to content

TechMedia

Header Image

[org.jenkins-ci.plugins:anchore-container-scanner] Jenkins Anchore Container Scanner Plugin vulnerable to Insufficiently Protected Credentials

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/07/2022

Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
The cr…

[org.jenkins-ci.plugins:delphix] Jenkins Delphix Plugin vulnerable to Cleartext credential storage

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/07/2022

Jenkins Delphix Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10453
https://je…

[org.jenkins-ci.plugins:icescrum] Jenkins iceScrum Plugin vulnerable to Cross-site Request Forgery

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/15/2022

A cross-site request forgery vulnerability in Jenkins iceScrum Plugin prior to version 1.1.6 allows attackers to connect to an attacker-specified URL using attacker-specified credentials. This issue is patched in version 1.1.6
References

https://nvd.n…

[org.jenkins-ci.plugins:icescrum] Jenkins iceScrum Plugin stores credentials in Cleartext

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/07/2022

Jenkins iceScrum Plugin 1.1.4 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
References

https://nvd.nist….

[com.mtvi.plateng.hudson:ldapemail] Jenkins LDAP Email Plugin shows plain text password in configuration form

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/28/2023

Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10434
https://jenkins.io/security/…

[pterodactyl/panel] Pterodactyl vulnerable to 2FA Sniffing

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/09/2023

Pterodactyl version 0.7.13 and lower – 2FA Sniffing
Users who have enabled 2FA protections on their account can unintentionally have their account’s existence sniffed by malicious users who enter random credentials into the login fields.
Impact
Users w…

[werkzeug] Pallets Werkzeug vulnerable to Path Traversal

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202202/02/2023

In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-14322
https://palletsprojects.com/blog/werkzeug-0-15-5-released/
http://packetstorms…

[org.jenkins-ci.plugins:depgraph-view] Jenkins Dependency Graph Viewer Plugin contains Cross-site Scripting

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202202/02/2023

A stored cross site scripting vulnerability in Jenkins Dependency Graph Viewer Plugin 0.13 and earlier allowed attackers able to configure jobs in Jenkins to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.
References

…

[io.jenkins.plugins:embeddable-build-status-plugin] Jenkins Embeddable Build Status Plugin contains Cross-site Scripting

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202202/01/2023

A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10…

[io.jenkins.docker:docker-plugin] Jenkins Docker Plugin contains Cross-Site Request Forgery

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202202/01/2023

A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs o…

Posts navigation

Previous Posts 1 … 81,982 81,983 81,984 81,985 81,986 … 82,021 Next Posts

Recent Posts

  • 大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
  • サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
  • 吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
  • 【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)
  • 驚き!地球!グレートネイチャー「探検!未知なる海へ~北極海・ポリネシア~」[解][字]
An error has occurred, which probably means the feed is down. Try again later.
RSS Error: A feed could not be found at `https://nordot.app/-/feed/posts/rss?source_id=646357622673671265&curation_url=true`; the status code is `404` and content-type is `text/html; charset=UTF-8`
  • News
  • Twitter
  • Twilog
  • Scrapbox
  • Twitter log
  • Apple News
  • Mastodon log
  • coron news&archives
  • SNSNews
  • TechnoPlanet
  • iTech
  • ComputerJournal
  • Underground News
  • Last.fm
  • はてなブックマーク
  • Tumblr
  • ツイフィール
  • ウェブサイト利用規約
  • Google提供広告の広告設定
  • 他の広告のオプトアウト
  • Valuecommerce配信広告のオプトアウト
  • Zuck配信広告のオプトアウト
  • i-mobile配信広告のオプトアウト
  • Amazon.co.jpパーソナライズド広告の設定

What’s TechMedia

TechMediaはオープンRSS情報サイトです。世界中のウェブサイトから情報を収集し、検索のヒントになる情報を掲載しています。登録RSSの追加依頼はこちらから

TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close