3 results (0.019 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability. El plugin Code Coverage API de Jenkins versiones 1.4.0 y anteriores, no aplica la protección de deserialización JEP-200 de Jenkins a los objetos Java que deserializa del disco, resultando en una vulnerabilidad de Ejecución de Código Remota • http://www.openwall.com/lists/oss-security/2021/08/31/1 https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2376 • CWE-502: Deserialization of Untrusted Data •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins Code Coverage API Plugin versiones 1.1.4 y anteriores, no configuran su analizador XML para impedir ataques de tipo XML external entity (XXE). • http://www.openwall.com/lists/oss-security/2020/04/07/3 https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1699 • CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Jenkins Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view, resulting in a stored XSS vulnerability exploitable by users able to change job configurations. Jenkins Code Coverage API Plugin versiones 1.1.2 y anteriores, no escapan al nombre de archivo del reporte de cobertura utilizado en su vista, resultando en una vulnerabilidad de tipo XSS almacenada explotable por los usuarios capaces de cambiar las configuraciones de trabajo. • http://www.openwall.com/lists/oss-security/2020/01/29/1 https://jenkins.io/security/advisory/2020-01-29/#SECURITY-1680 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •