Jenkins Xebialabs Xl Release
By the Year
In 2024 there have been 0 vulnerabilities in Jenkins Xebialabs Xl Release . Xebialabs Xl Release did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 3 | 5.77 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Xebialabs Xl Release vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Xebialabs Xl Release Security Vulnerabilities
Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier
CVE-2022-34781
6.5 - Medium
- June 30, 2022
Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
AuthZ
A cross-site request forgery (CSRF) vulnerability in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier
CVE-2022-34780
6.5 - Medium
- June 30, 2022
A cross-site request forgery (CSRF) vulnerability in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Session Riding
A missing permission check in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier
CVE-2022-34779
4.3 - Medium
- June 30, 2022
A missing permission check in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Xebialabs Xl Release or by Jenkins? Click the Watch button to subscribe.