Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
Podatności dla
'Warnings next generation'
2022-01-12
CVE-2022-23107
CWE-22
Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
2021-03-18
CVE-2021-21626
CWE-862
Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
2019-05-31
CVE-2019-10326
CWE-352
A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.
CVE-2019-10325
CWE-79
A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.
2019-02-06
CVE-2019-1003023
CWE-79
A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML.
CVE-2019-1003008
CWE-352
A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.
>>>
Vendor:
Jenkins
480
Produkty
Jenkins
Tap plugin
Image gallery plugin
Extra columns plugin
Script security
Pipeline
Poll scm
Docker commons
Github branch source
GIT
Blue ocean
Datadog
Config file provider
Owasp dependency-check
Pipeline-input-step
Deploy to container
DRY
Static analysis utilities
Periodic backup
Sidebar link
Role-based authorization strategy
Parameterized trigger
Subversion
Git client
Favorite plugin
SSH
PMD
Checkstyle
Findbugs
Warnings
Release
Translation assistance
Maven
Swarm
Pipeline nodes and processes
Delivery pipeline
Build-publisher
Dependency graph viewer
Multijob
Global-build-stats
EC2
Active choices
Speaks!
CCM
Android lint
Junit
Credentials binding
Pipeline supporting apis
Gerrit trigger
Cppncss
Google-play-android-publisher
Mercurial
Testlink
Promoted builds
Job and node ownership
Coverity
Mailer
Cucumber living documentation
Github pull request builder
Reverse proxy auth
Vsphere
Liquibase runner
Copy to slave
Ansible
Google login
Html publisher
Email extension
S3 publisher
Github
Kubernetes
CAS
Absint astree
Black duck hub
Black duck detect
Gitlab hook
Groovy postbuild
Ssh credentials
SAML
Openstack cloud
Badge
Urltrigger
Fortify cloudscan
Z/os connector
Configuration as code
Collabnet
Aws codepipeline
Aws codedeploy
Aws codebuild
Active directory
Distributed fork
Pipeline classpath step
Accurev
Shelve project
Meliora testlab
Ssh agent
Tinfoil security
Inedo proget
Tracetronic ecu-test
Inedo buildmaster
Maven artifact choicelistprovider (nexus)
Zobacz wszystkie produkty dla producenta
Jenkins
Copyright
2024
, cxsecurity.com
Back to Top