Jenkins Parameterized Remote Trigger
By the Year
In 2024 there have been 0 vulnerabilities in Jenkins Parameterized Remote Trigger . Parameterized Remote Trigger did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 1 | 5.50 |
2021 | 0 | 0.00 |
2020 | 1 | 4.30 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Parameterized Remote Trigger vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Parameterized Remote Trigger Security Vulnerabilities
Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin
CVE-2022-27195
5.5 - Medium
- March 15, 2022
Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.
Jenkins Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file on the Jenkins controller where it
CVE-2020-2239
4.3 - Medium
- September 01, 2020
Jenkins Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.
Missing Encryption of Sensitive Data
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Parameterized Remote Trigger or by Jenkins? Click the Watch button to subscribe.