Lucene search

K

5 matches found

CVE
CVE
added 2022/07/27 3:15 p.m.332 views

CVE-2022-36883

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

7.5CVSS7.3AI score0.76213EPSS
CVE
CVE
added 2022/07/27 3:15 p.m.103 views

CVE-2022-36882

A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

8.8CVSS8.4AI score0.00447EPSS
CVE
CVE
added 2022/07/27 3:15 p.m.102 views

CVE-2022-36884

The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.

5.3CVSS5.3AI score0.00515EPSS
CVE
CVE
added 2022/08/23 5:15 p.m.100 views

CVE-2022-38663

Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (gitUsernamePassword) credentials binding.

6.5CVSS6.3AI score0.017EPSS
CVE
CVE
added 2022/05/17 3:15 p.m.94 views

CVE-2022-30947

Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

7.5CVSS7.3AI score0.01143EPSS