Lucene search

K

5 matches found

CVE
CVE
added 2022/04/12 8:15 p.m.99 views

CVE-2022-29040

Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

5.4CVSS5.4AI score0.31598EPSS
CVE
CVE
added 2020/02/12 3:15 p.m.64 views

CVE-2020-2112

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

5.4CVSS5.2AI score0.00121EPSS
CVE
CVE
added 2020/02/12 3:15 p.m.52 views

CVE-2020-2113

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the default value shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

5.4CVSS5.2AI score0.00121EPSS
CVE
CVE
added 2020/09/01 2:15 p.m.50 views

CVE-2020-2238

Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

5.4CVSS5.3AI score0.00233EPSS
CVE
CVE
added 2025/07/09 4:15 p.m.7 views

CVE-2025-53652

Jenkins Git Parameter Plugin 439.vb_0e46ca_14534 and earlier does not validate that the Git parameter value submitted to the build matches one of the offered choices, allowing attackers with Item/Build permission to inject arbitrary values into Git parameters.

8.2CVSS6.5AI score0.00155EPSS