Mashup Portlets Jenkins Mashup Portlets

Do you want an email whenever new security vulnerabilities are reported in Jenkins Mashup Portlets?

By the Year

In 2023 there have been 1 vulnerability in Jenkins Mashup Portlets with an average score of 5.4 out of ten. Mashup Portlets did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2023 as compared to last year.

Year Vulnerabilities Average Score
2023 1 5.40
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 1 8.80
2018 0 0.00

It may take a day or so for new Mashup Portlets vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Mashup Portlets Security Vulnerabilities

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature

CVE-2023-28679 5.4 - Medium - April 02, 2023

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

XSS

Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they

CVE-2019-10347 8.8 - High - July 11, 2019

Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.

Credentials Management Errors

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Mashup Portlets or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe