Jenkins TraceTronic ECU-TEST Plugin 2.23.1 stores unencrypted credentials, accessible to users with Jenkins controller file system acces
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2021-21612 | 13 Jan 202116:15 | – | osv |
![]() | Credentials stored in plain text by Jenkins TraceTronic ECU-TEST Plugin | 24 May 202217:39 | – | osv |
![]() | CVE-2021-21612 | 13 Jan 202116:15 | – | cve |
![]() | CVE-2021-21612 | 13 Jan 202116:15 | – | nvd |
![]() | Design/Logic Flaw | 13 Jan 202116:15 | – | prion |
![]() | Information Disclosure | 14 Jan 202116:24 | – | veracode |
![]() | CVE-2021-21612 | 13 Jan 202115:55 | – | cvelist |
![]() | Credentials stored in plain text by Jenkins TraceTronic ECU-TEST Plugin | 24 May 202217:39 | – | github |
![]() | Jenkins Enterprise and Operations Center < 2.222.43.0.1 / 2.249.30.0.1 / 2.263.2.2 Multiple Vulnerabilities (CloudBees Security Advisory 2021-01-13) | 29 Nov 202100:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | 3.12-community | noarch | jenkins | 2.275-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo