×
Feb 15, 2022 · This allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM ...
Missing: web | Show results with:web
Oct 19, 2022 · This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of ...
Apr 9, 2024 · Enables user authorization using a Role-Based strategy. Roles can be defined globally or for particular jobs or nodes selected by regular ...
May 17, 2022 · This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local ...
Apr 12, 2022 · This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of ...
Aug 16, 2023 · 5.1 uses the configured SCM URL, instead of a user-specified URL provided as a parameter to the HTTP endpoint. CSRF vulnerability and missing ...
Missing: web | Show results with:web
To maximize security, credentials configured in Jenkins are stored in an encrypted form on the controller Jenkins instance (encrypted by the Jenkins instance ID) ...
Permission, which represents an activity that requires a security privilege. This is usually a verb, like "configure", "administer", "tag", etc.
Missing: scm | Show results with:scm
Jan 12, 2022 · This results in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of ...
We strive to fix all security vulnerabilities in Jenkins and plugins in a timely manner. However, the structure of the Jenkins project, which gives plugin ...