Jenkins

Warnings Next Generation

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.66%
  • Published 12.01.2022 20:15:09
  • Last modified 21.11.2024 06:48:00

Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins con...

  • EPSS 0.03%
  • Published 18.03.2021 14:15:13
  • Last modified 21.11.2024 05:48:43

Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check wheth...

  • EPSS 0.06%
  • Published 31.05.2019 15:29:00
  • Last modified 21.11.2024 04:18:53

A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.

  • EPSS 0.28%
  • Published 31.05.2019 15:29:00
  • Last modified 21.11.2024 04:18:53

A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.

  • EPSS 0.04%
  • Published 06.02.2019 16:29:01
  • Last modified 21.11.2024 04:17:45

A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail...

  • EPSS 0.07%
  • Published 06.02.2019 16:29:00
  • Last modified 21.11.2024 04:17:43

A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form v...