CVE-2025-53652
- EPSS 0.04%
- Veröffentlicht 09.07.2025 15:39:27
- Zuletzt bearbeitet 18.07.2025 18:03:14
Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git p...
CVE-2022-29040
- EPSS 31.6%
- Veröffentlicht 12.04.2022 20:15:09
- Zuletzt bearbeitet 21.11.2024 06:58:23
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure per...
CVE-2020-2238
- EPSS 0.23%
- Veröffentlicht 01.09.2020 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:25:03
Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2020-2112
- EPSS 0.12%
- Veröffentlicht 12.02.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:24:40
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
CVE-2020-2113
- EPSS 0.12%
- Veröffentlicht 12.02.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:24:40
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the default value shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.