Max CVSS | 3.5 | Min CVSS | 3.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-10405 | 3.5 |
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
|
02-11-2023 - 21:30 | 25-09-2019 - 16:15 | |
CVE-2019-10406 | 3.5 |
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.
|
02-11-2023 - 21:30 | 25-09-2019 - 16:15 | |
CVE-2019-10404 | 3.5 |
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the reason why a queue items is blcoked in tooltips, resulting in a stored XSS vulnerability exploitable by users able to control parts of the reason a queue item is blocked, such as l
|
02-11-2023 - 21:30 | 25-09-2019 - 16:15 | |
CVE-2019-10402 | 3.5 |
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.
|
02-11-2023 - 21:06 | 25-09-2019 - 16:15 | |
CVE-2019-10403 | 3.5 |
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the SCM tag name on the tooltip for SCM tag actions, resulting in a stored XSS vulnerability exploitable by users able to control SCM tag names for these actions.
|
02-11-2023 - 21:06 | 25-09-2019 - 16:15 | |
CVE-2019-10401 | 3.5 |
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically
|
02-11-2023 - 21:06 | 25-09-2019 - 16:15 |