Continuous Integration With Toad Edge Jenkins Continuous Integration With Toad Edge

Do you want an email whenever new security vulnerabilities are reported in Jenkins Continuous Integration With Toad Edge?

By the Year

In 2024 there have been 0 vulnerabilities in Jenkins Continuous Integration With Toad Edge . Continuous Integration With Toad Edge did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 3 5.40
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Continuous Integration With Toad Edge vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Continuous Integration With Toad Edge Security Vulnerabilities

A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier

CVE-2022-28147 4.3 - Medium - March 29, 2022

A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

AuthZ

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier

CVE-2022-28146 6.5 - Medium - March 29, 2022

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.

Directory traversal

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves

CVE-2022-28145 5.4 - Medium - March 29, 2022

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Continuous Integration With Toad Edge or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe