Lucene search

K
JenkinsSubversion

7 matches found

CVE
CVE
added 2022/04/12 8:15 p.m.181 views

CVE-2022-29046

Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

5.4CVSS5.2AI score0.01341EPSS
CVE
CVE
added 2020/11/04 3:15 p.m.147 views

CVE-2020-2304

Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

6.5CVSS6.4AI score0.01288EPSS
CVE
CVE
added 2021/11/04 5:15 p.m.138 views

CVE-2021-21698

Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.

7.5CVSS8.3AI score0.00972EPSS
CVE
CVE
added 2022/04/12 8:15 p.m.112 views

CVE-2022-29048

A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and earlier allows attackers to connect to an attacker-specified URL.

4.3CVSS4.7AI score0.00074EPSS
CVE
CVE
added 2020/02/12 3:15 p.m.103 views

CVE-2020-2111

Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.

5.4CVSS5.3AI score0.00083EPSS
CVE
CVE
added 2017/10/05 1:29 a.m.73 views

CVE-2017-1000085

Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion serv...

6.5CVSS6.4AI score0.00141EPSS
CVE
CVE
added 2018/03/13 1:29 p.m.62 views

CVE-2018-1000111

An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in SubversionStatus.java and SubversionRepositoryStatus.java that allows an attacker with network access to obtain a list of nodes and users.

5.3CVSS5AI score0.00038EPSS