Jenkins

Github Pull Request Builder

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Published 26.01.2023 21:18:17
  • Last modified 02.04.2025 14:15:37

A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capt...

  • EPSS 0.16%
  • Published 26.01.2023 21:18:17
  • Last modified 02.04.2025 14:15:38

A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method...

  • EPSS 0.18%
  • Published 26.01.2023 21:18:17
  • Last modified 02.04.2025 14:15:38

A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

  • EPSS 0.1%
  • Published 05.06.2018 20:29:00
  • Last modified 21.11.2024 03:39:53

A exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin 1.41.0 and older in GhprbGitHubAuth.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-spec...

  • EPSS 0.02%
  • Published 05.04.2018 13:29:00
  • Last modified 21.11.2024 03:39:46

An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.

  • EPSS 0.02%
  • Published 05.04.2018 13:29:00
  • Last modified 21.11.2024 03:39:46

An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.