Jenkins Active Choices
By the Year
In 2024 there have been 0 vulnerabilities in Jenkins Active Choices . Active Choices did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 2 | 5.00 |
2020 | 2 | 5.40 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Active Choices vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Active Choices Security Vulnerabilities
Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters
CVE-2021-21699
5.4 - Medium
- November 12, 2021
Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
XSS
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values
CVE-2021-21616
4.6 - Medium
- February 24, 2021
Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
XSS
Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters
CVE-2020-2289
5.4 - Medium
- October 08, 2020
Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
XSS
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters
CVE-2020-2290
5.4 - Medium
- October 08, 2020
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
XSS
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Active Choices or by Jenkins? Click the Watch button to subscribe.