Jenkins Role Based Authorization Strategy
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Jenkins Role Based Authorization Strategy.
By the Year
In 2025 there have been 0 vulnerabilities in Jenkins Role Based Authorization Strategy. Role Based Authorization Strategy did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 1 | 9.80 |
2022 | 0 | 0.00 |
2021 | 1 | 4.30 |
2020 | 1 | 8.80 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Role Based Authorization Strategy vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Role Based Authorization Strategy Security Vulnerabilities
Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.
CVE-2023-28668
9.8 - Critical
- April 02, 2023
Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.
Improper Preservation of Permissions
An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier
CVE-2021-21624
4.3 - Medium
- March 18, 2021
An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.
AuthZ
Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed
CVE-2020-2286
8.8 - High
- October 08, 2020
Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Role Based Authorization Strategy or by Jenkins? Click the Watch button to subscribe.
