CVE-2022-46682
https://notcve.org/view.php?id=CVE-2022-46682
Jenkins Plot Plugin 2.1.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins Plot Plugin 2.1.11 y versiones anteriores no configuran su analizador XML para evitar ataques de entidades externas XML (XXE). • https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2940 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2022-34783
https://notcve.org/view.php?id=CVE-2022-34783
Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins Plot Plugin versiones 2.1.10 y anteriores, no escapa de las descripciones de las parcelas, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenada, explotable por atacantes con permiso de Item/Configure • https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2220 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-28154
https://notcve.org/view.php?id=CVE-2022-28154
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins Coverage/Complexity Scatter Plot Plugin versiones 1.1.1 y anteriores, no configura su parser XML para prevenir ataques de tipo XML external entity (XXE) • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2020-2265
https://notcve.org/view.php?id=CVE-2020-2265
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. Jenkins Coverage/Complexity Scatter Plot Plugin versiones 1.1.1 y anteriores, no escapa la información del método en tooltips, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenado explotable por atacantes capaces de proporcionar archivos de reportes en el paso posterior a la complicación del plugin • http://www.openwall.com/lists/oss-security/2020/09/16/3 https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1913 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •