Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jenkins Improper Restriction of Rendered UI Layers or Frames Vulnerability (CVE-2020-2105)
|
CVE-2020-2105
CWE-1021
|
CWE-1021
|
Medium
|
Jenkins Inadequate Encryption Strength Vulnerability (CVE-2017-2598)
|
CVE-2017-2598
CWE-326
|
CWE-326
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2017-2599)
|
CVE-2017-2599
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2017-2611)
|
CVE-2017-2611
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999003)
|
CVE-2018-1999003
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999004)
|
CVE-2018-1999004
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999047)
|
CVE-2018-1999047
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2020-2104)
|
CVE-2020-2104
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2021-21609)
|
CVE-2021-21609
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2021-21670)
|
CVE-2021-21670
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2021-21692 )
|
CVE-2021-21692
CWE-863
|
CWE-863
|
Critical
|
Jenkins Incorrect Authorization Vulnerability (CVE-2022-34175)
|
CVE-2022-34175
CWE-863
|
CWE-863
|
High
|
Jenkins Incorrect Authorization Vulnerability (CVE-2023-27899)
|
CVE-2023-27899
CWE-863
|
CWE-863
|
High
|
Jenkins Incorrect Authorization Vulnerability (CVE-2023-27903)
|
CVE-2023-27903
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Default Permissions Vulnerability (CVE-2023-43496)
|
CVE-2023-43496
CWE-276
|
CWE-276
|
High
|
Jenkins Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2017-2612)
|
CVE-2017-2612
CWE-732
|
CWE-732
|
Medium
|
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003003)
|
CVE-2019-1003003
CWE-613
|
CWE-613
|
High
|
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003004)
|
CVE-2019-1003004
CWE-613
|
CWE-613
|
High
|
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003049)
|
CVE-2019-1003049
CWE-613
|
CWE-613
|
High
|
Jenkins Insufficient Verification of Data Authenticity Vulnerability (CVE-2015-7539)
|
CVE-2015-7539
CWE-345
|
CWE-345
|
High
|
Jenkins Integer Overflow or Wraparound Vulnerability (CVE-2023-36478)
|
CVE-2023-36478
CWE-190
|
CWE-190
|
High
|
Jenkins Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1000864)
|
CVE-2018-1000864
CWE-835
|
CWE-835
|
Medium
|
Jenkins Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1999044)
|
CVE-2018-1999044
CWE-835
|
CWE-835
|
Medium
|
Jenkins Missing Authorization Vulnerability (CVE-2017-1000400)
|
CVE-2017-1000400
CWE-862
|
CWE-862
|
Medium
|
Jenkins Missing Authorization Vulnerability (CVE-2019-10354)
|
CVE-2019-10354
CWE-862
|
CWE-862
|
Medium
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21685)
|
CVE-2021-21685
CWE-862
|
CWE-862
|
Critical
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21687)
|
CVE-2021-21687
CWE-862
|
CWE-862
|
Critical
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21688)
|
CVE-2021-21688
CWE-862
|
CWE-862
|
High
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21694)
|
CVE-2021-21694
CWE-862
|
CWE-862
|
Critical
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21695)
|
CVE-2021-21695
CWE-862
|
CWE-862
|
High
|
Jenkins Missing Authorization Vulnerability (CVE-2024-43045)
|
CVE-2024-43045
CWE-862
|
CWE-862
|
Medium
|
Jenkins Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2018-1999043)
|
CVE-2018-1999043
CWE-772
|
CWE-772
|
High
|
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-2101)
|
CVE-2020-2101
|
|
Medium
|
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-2102)
|
CVE-2020-2102
|
|
Medium
|
Jenkins Observable Discrepancy Vulnerability (CVE-2022-34174)
|
CVE-2022-34174
CWE-203
|
CWE-203
|
High
|
Jenkins open people list
|
CWE-200
|
CWE-200
|
Low
|
Jenkins open user registration
|
CWE-200
|
CWE-200
|
Medium
|
Jenkins Origin Validation Error Vulnerability (CVE-2024-23898)
|
CVE-2024-23898
CWE-346
|
CWE-346
|
High
|
Jenkins Other Vulnerability (CVE-2015-5319)
|
CVE-2015-5319
|
|
Medium
|
Jenkins Other Vulnerability (CVE-2016-3726)
|
CVE-2016-3726
|
|
High
|
Jenkins Other Vulnerability (CVE-2020-2100)
|
CVE-2020-2100
|
|
Medium
|
Jenkins Other Vulnerability (CVE-2021-21689)
|
CVE-2021-21689
|
|
Critical
|
Jenkins Other Vulnerability (CVE-2021-21696)
|
CVE-2021-21696
|
|
Critical
|
Jenkins Other Vulnerability (CVE-2021-21697)
|
CVE-2021-21697
|
|
Critical
|
Jenkins Other Vulnerability (CVE-2022-2048)
|
CVE-2022-2048
|
|
Medium
|
Jenkins Passwords transmitted in plain text (CVE-2020-2251)
|
CVE-2020-2251
|
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-7330)
|
CVE-2013-7330
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2058)
|
CVE-2014-2058
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2068)
|
CVE-2014-2068
CWE-264
|
CWE-264
|
Low
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3663)
|
CVE-2014-3663
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3665)
|
CVE-2014-3665
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1806)
|
CVE-2015-1806
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1810)
|
CVE-2015-1810
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814)
|
CVE-2015-1814
CWE-264
|
CWE-264
|
High
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323)
|
CVE-2015-5323
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5324)
|
CVE-2015-5324
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0788)
|
CVE-2016-0788
CWE-264
|
CWE-264
|
Critical
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3722)
|
CVE-2016-3722
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3725)
|
CVE-2016-3725
CWE-264
|
CWE-264
|
Medium
|
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21690 )
|
CVE-2021-21690
CWE-693
|
CWE-693
|
Critical
|
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21696 )
|
CVE-2021-21696
CWE-693
|
CWE-693
|
Critical
|
Jenkins Resource Management Errors Vulnerability (CVE-2014-3661)
|
CVE-2014-3661
|
|
Medium
|
Jenkins Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-1000067)
|
CVE-2018-1000067
CWE-918
|
CWE-918
|
Medium
|
Jenkins Session Fixation Vulnerability (CVE-2018-1000409)
|
CVE-2018-1000409
CWE-384
|
CWE-384
|
Medium
|
Jenkins Session Fixation Vulnerability (CVE-2021-21671)
|
CVE-2021-21671
CWE-384
|
CWE-384
|
High
|
Jenkins Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2021-21615)
|
CVE-2021-21615
CWE-367
|
CWE-367
|
Medium
|
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785)
|
CVE-2012-0785
CWE-400
|
CWE-400
|
High
|
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
|
CVE-2021-28165
CWE-400
|
CWE-400
|
High
|
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-43497)
|
CVE-2023-43497
CWE-434
|
CWE-434
|
High
|
Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099)
|
CVE-2020-2099
CWE-330
|
CWE-330
|
High
|
Jenkins user enumeration
|
CWE-200
|
CWE-200
|
Low
|
Jenkins weak password
|
CWE-200
|
CWE-200
|
High
|
JetBrains .idea project directory
|
CWE-538
|
CWE-538
|
Medium
|
JetLeak vulnerability
|
CVE-2015-2080
CWE-200
|
CWE-200
|
High
|
Jetpack 2.9.3: Critical Security Update
|
CVE-2014-0173
CWE-287
|
CWE-287
|
High
|