Jenkins Paaslane Estimate
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Jenkins Paaslane Estimate.
By the Year
In 2025 there have been 0 vulnerabilities in Jenkins Paaslane Estimate. Paaslane Estimate did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 4 | 5.43 |
It may take a day or so for new Paaslane Estimate vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Paaslane Estimate Security Vulnerabilities
Missing perms in Jenkins PaaSLane Estimate Plugin <=1.0.4 allow attacker
CVE-2023-50779
4.3 - Medium
- December 13, 2023
Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.
AuthZ
Jenkins PaaSLane Estimate Plugin 1.0.4 CSRF: external URL redirect via token
CVE-2023-50778
8.8 - High
- December 13, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token.
Session Riding
Jenkins PaaSLane Plugin 1.0.4 - Auth Token Leak
CVE-2023-50777
4.3 - Medium
- December 13, 2023
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Cleartext Storage of Sensitive Information
Jenkins PaaSLane Estimate Plugin <=1.0.4 Unencrypted Auth Tokens in config.xml
CVE-2023-50776
4.3 - Medium
- December 13, 2023
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Cleartext Storage of Sensitive Information
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Paaslane Estimate or by Jenkins? Click the Watch button to subscribe.