CVE-2022-23106
- EPSS 0.31%
- Veröffentlicht 12.01.2022 20:15:09
- Zuletzt bearbeitet 21.11.2024 06:48:00
Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
CVE-2019-10367
- EPSS 0.02%
- Veröffentlicht 07.08.2019 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:58
Due to an incomplete fix of CVE-2019-10343, Jenkins Configuration as Code Plugin 1.26 and earlier did not properly apply masking to some values expected to be hidden when logging the configuration being applied.
CVE-2019-10343
- EPSS 0.02%
- Veröffentlicht 31.07.2019 13:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:55
Jenkins Configuration as Code Plugin 1.24 and earlier did not properly apply masking to values expected to be hidden when logging the configuration being applied.
CVE-2019-10344
- EPSS 0.03%
- Veröffentlicht 31.07.2019 13:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:56
Missing permission checks in Jenkins Configuration as Code Plugin 1.24 and earlier in various HTTP endpoints allowed users with Overall/Read access to access the generated schema and documentation for this plugin containing detailed information about...
CVE-2019-10345
- EPSS 0.01%
- Veröffentlicht 31.07.2019 13:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:56
Jenkins Configuration as Code Plugin 1.20 and earlier did not treat the proxy password as a secret to be masked when logging or encrypted for export.
CVE-2019-10362
- EPSS 0.12%
- Veröffentlicht 31.07.2019 13:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:58
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values...
CVE-2019-10363
- EPSS 0.05%
- Veröffentlicht 31.07.2019 13:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:58
Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.
CVE-2018-1000609
- EPSS 0.07%
- Veröffentlicht 26.06.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:40:13
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.
CVE-2018-1000610
- EPSS 0.05%
- Veröffentlicht 26.06.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:40:13
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access ...