Jenkins Mashup Portlets
By the Year
In 2023 there have been 1 vulnerability in Jenkins Mashup Portlets with an average score of 5.4 out of ten. Mashup Portlets did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2023 as compared to last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 1 | 5.40 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 1 | 8.80 |
2018 | 0 | 0.00 |
It may take a day or so for new Mashup Portlets vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Mashup Portlets Security Vulnerabilities
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature
CVE-2023-28679
5.4 - Medium
- April 02, 2023
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.
XSS
Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they
CVE-2019-10347
8.8 - High
- July 11, 2019
Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.
Credentials Management Errors
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Mashup Portlets or by Jenkins? Click the Watch button to subscribe.
