Role Based Authorization Strategy Jenkins Role Based Authorization Strategy

Do you want an email whenever new security vulnerabilities are reported in Jenkins Role Based Authorization Strategy?

By the Year

In 2024 there have been 0 vulnerabilities in Jenkins Role Based Authorization Strategy . Last year Role Based Authorization Strategy had 1 security vulnerability published. Right now, Role Based Authorization Strategy is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 9.80
2022 0 0.00
2021 1 4.30
2020 1 8.80
2019 0 0.00
2018 0 0.00

It may take a day or so for new Role Based Authorization Strategy vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Role Based Authorization Strategy Security Vulnerabilities

Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.

CVE-2023-28668 9.8 - Critical - April 02, 2023

Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.

Improper Preservation of Permissions

An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier

CVE-2021-21624 4.3 - Medium - March 18, 2021

An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.

AuthZ

Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed

CVE-2020-2286 8.8 - High - October 08, 2020

Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Role Based Authorization Strategy or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe