vulnerability
Jenkins Advisory 2019-09-25: CVE-2019-10424: elOyente Plugin stores credentials in plain text
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Sep 25, 2019 | Dec 2, 2021 | Aug 11, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Sep 25, 2019
Added
Dec 2, 2021
Modified
Aug 11, 2025
Description
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Solutions
jenkins-lts-upgrade-2_176_4jenkins-upgrade-2_197
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.