Vulnerability Name CVE Severity
Jenkins Passwords transmitted in plain text (CVE-2020-2251) CVE-2020-2251
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-7330) CVE-2013-7330
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2058) CVE-2014-2058
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2068) CVE-2014-2068
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3663) CVE-2014-3663
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3665) CVE-2014-3665
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1806) CVE-2015-1806
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1810) CVE-2015-1810
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814) CVE-2015-1814
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323) CVE-2015-5323
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5324) CVE-2015-5324
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0788) CVE-2016-0788
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3722) CVE-2016-3722
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3725) CVE-2016-3725
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21690 ) CVE-2021-21690
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21696 ) CVE-2021-21696
Jenkins Resource Management Errors Vulnerability (CVE-2014-3661) CVE-2014-3661
Jenkins Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-1000067) CVE-2018-1000067
Jenkins Session Fixation Vulnerability (CVE-2018-1000409) CVE-2018-1000409
Jenkins Session Fixation Vulnerability (CVE-2021-21671) CVE-2021-21671
Jenkins Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2021-21615) CVE-2021-21615
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785) CVE-2012-0785
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-43497) CVE-2023-43497
Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099) CVE-2020-2099
Jenkins user enumeration
Jenkins weak password
JetBrains .idea project directory
JetLeak vulnerability CVE-2015-2080
Jetpack 2.9.3: Critical Security Update CVE-2014-0173
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-26048) CVE-2023-26048
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-6762) CVE-2024-6762
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-8184) CVE-2024-8184
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-22201) CVE-2024-22201
Jetty ConcatServlet Information Disclosure (CVE-2021-28169) CVE-2021-28169
Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656) CVE-2017-7656
Jetty CVE-2018-12536 Vulnerability (CVE-2018-12536) CVE-2018-12536
Jetty CVE-2020-27218 Vulnerability (CVE-2020-27218) CVE-2020-27218
Jetty CVE-2023-26049 Vulnerability (CVE-2023-26049) CVE-2023-26049
Jetty CVE-2023-40167 Vulnerability (CVE-2023-40167) CVE-2023-40167
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045) CVE-2009-5045
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080) CVE-2015-2080
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-28169) CVE-2021-28169
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429) CVE-2021-34429
Jetty Improper Access Control Vulnerability (CVE-2016-4800) CVE-2016-4800
Jetty Improper Input Validation Vulnerability (CVE-2022-2047) CVE-2022-2047
Jetty Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-28163) CVE-2021-28163
Jetty Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-5046) CVE-2009-5046
Jetty Improper Neutralization of Quoting Syntax Vulnerability (CVE-2023-36479) CVE-2023-36479
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191) CVE-2022-2191
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-5047) CVE-2009-5047
Jetty Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7658) CVE-2017-7658
Jetty Information Disclosure (CVE-2021-34429) CVE-2021-34429 CVE-2021-28164
Jetty Insufficient Session Expiration Vulnerability (CVE-2021-34428) CVE-2021-34428
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2017-7657) CVE-2017-7657
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478) CVE-2023-36478
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735) CVE-2017-9735
Jetty Other Vulnerability (CVE-2020-27216) CVE-2020-27216
Jetty Other Vulnerability (CVE-2024-6763) CVE-2024-6763
Jetty Session Fixation Vulnerability (CVE-2018-12538) CVE-2018-12538
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223) CVE-2020-27223
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048) CVE-2022-2048
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487) CVE-2023-44487
Jetty Weak Authentication Vulnerability (CVE-2023-41900) CVE-2023-41900
Jira Projects accessible anonymously
Jira QueryComponent Information Disclosure (CVE-2020-14179) CVE-2020-14179
JIRA Security Advisory 2012-08-28
JIRA Security Advisory 2013-02-21
JIRA Security Advisory 2014-02-26
Jira Seraph Authentication Bypass (CVE-2022-0540) CVE-2022-0540
Jira SSTI CVE-2019-11581 CVE-2019-11581
Jira Unauthorized SSRF via REST API CVE-2019-8451
Jira Unauthorized User Enumeration (CVE-2020-14181) CVE-2020-14181
Jira Unauthorized User Enumeration via UserPickerBrowser