Vulnerabilities > Jenkins > Jenkins > 1.256
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-03-25 | CVE-2020-2161 | Cross-site Scripting vulnerability in Jenkins Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels. | 5.4 |
2020-03-25 | CVE-2020-2160 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL. | 8.8 |
2020-02-24 | CVE-2012-0785 | Resource Exhaustion vulnerability in multiple products Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack." | 7.8 |
2020-01-29 | CVE-2020-2105 | Improper Restriction of Rendered UI Layers or Frames vulnerability in Jenkins REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks. | 5.4 |
2020-01-29 | CVE-2020-2104 | Incorrect Authorization vulnerability in Jenkins Jenkins 2.218 and earlier, LTS 2.204.1 and earlier allowed users with Overall/Read access to view a JVM memory usage chart. | 4.3 |
2020-01-29 | CVE-2020-2103 | Information Exposure vulnerability in Jenkins Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page. | 5.4 |
2020-01-29 | CVE-2020-2102 | Information Exposure Through Discrepancy vulnerability in Jenkins Jenkins 2.218 and earlier, LTS 2.204.1 and earlier used a non-constant time comparison function when validating an HMAC. | 5.3 |
2020-01-29 | CVE-2020-2101 | Information Exposure Through Discrepancy vulnerability in Jenkins Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret. | 5.3 |
2020-01-29 | CVE-2020-2100 | Unspecified vulnerability in Jenkins Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848. | 5.8 |
2020-01-29 | CVE-2020-2099 | Use of Insufficiently Random Values vulnerability in Jenkins Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents. | 8.6 |