Skip to content

TechMedia

Header Image
Category

HIGH

385 Posts

Featured

Posted byWpmaster
[Microsoft.NetCore.App.Runtime.win-arm] .NET Remote Code Execution Vulnerability
Posted byWpmaster
[github.com/traefik/traefik/v2] Traefik HTTP header parsing could cause a denial of service
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Exposure of Sensitive Information Through Metadata
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Insertion of Sensitive Information Into Sent Data

[org.jvnet.hudson.plugins:warnings] CSRF vulnerability in Jenkins warnings Plugin allows remote code execution

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/20/2022

warnings Plugin 5.0.1 and earlier does not require POST requests for a form validation method intended for testing custom warnings parsers, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to execute a…

[org.jenkins-ci.plugins:liquibase-runner] XXE vulnerability in Jenkins Liquibase Runner Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/20/2022

Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to provide Liquibase changesets evaluated by the plugin to have Jenkins parse a crafted XML file that u…

[org.jvnet.hudson.plugins:selection-tasks-plugin] System command execution vulnerability in Selection tasks Jenkins Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkin…

[org.jenkins-ci.plugins:description-column-plugin] Stored XSS vulnerability in Description Column Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Description Column Plugin 1.3 and earlier does not escape the job description in the column tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd….

[org.jenkins-ci.plugins:chosen-views-tabbar] Stored XSS vulnerability in chosen-views-tabbar Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views.
References

http…

[org.jvnet.hudson.plugins:clearcase-release] Stored XSS vulnerability in ClearCase Release Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins ClearCase Release Plugin 0.3 and earlier does not escape the composite baseline in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd.nis…

[org.jvnet.hudson.plugins:locked-files-report] Stored XSS vulnerability in Locked Files Report Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Locked Files Report Plugin 1.6 and earlier does not escape locked files’ names in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd.nist.gov/…

[org.jenkins-ci.plugins:covcomplplot] Stored XSS vulnerability in Coverage/Complexity Scatter Plot Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin’s p…

[org.jenkins-ci.plugins:custom-job-icon] Stored XSS vulnerability in Custom Job Icon Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Custom Job Icon Plugin 0.2 and earlier does not escape the job descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd.nist.gov/vul…

[io.jenkins.plugins:perfecto] OS command execution vulnerability in Perfecto Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Perfecto Plugin allows specifying Perfecto Connect Path and Perfecto Connect File Name in job configurations.
This command is executed on the Jenkins controller in Perfecto Plugin 1.17 and earlier, allowing attackers with Job/Configure permission to ru…

Posts navigation

Previous Posts 1 … 28 29 30 31 32 … 39 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close