Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jenkins Passwords transmitted in plain text (CVE-2020-2251)
|
CVE-2020-2251
|
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-7330)
|
CVE-2013-7330
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2058)
|
CVE-2014-2058
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2068)
|
CVE-2014-2068
CWE-264
|
CWE-264
|
Low
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3663)
|
CVE-2014-3663
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3665)
|
CVE-2014-3665
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1806)
|
CVE-2015-1806
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1810)
|
CVE-2015-1810
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814)
|
CVE-2015-1814
CWE-264
|
CWE-264
|
High
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323)
|
CVE-2015-5323
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5324)
|
CVE-2015-5324
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0788)
|
CVE-2016-0788
CWE-264
|
CWE-264
|
Critical
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3722)
|
CVE-2016-3722
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3725)
|
CVE-2016-3725
CWE-264
|
CWE-264
|
Medium
|
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21690 )
|
CVE-2021-21690
CWE-693
|
CWE-693
|
Critical
|
Jenkins Protection Mechanism Failure Vulnerability (CVE-2021-21696 )
|
CVE-2021-21696
CWE-693
|
CWE-693
|
Critical
|
Jenkins Resource Management Errors Vulnerability (CVE-2014-3661)
|
CVE-2014-3661
|
|
Medium
|
Jenkins Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-1000067)
|
CVE-2018-1000067
CWE-918
|
CWE-918
|
Medium
|
Jenkins Session Fixation Vulnerability (CVE-2018-1000409)
|
CVE-2018-1000409
CWE-384
|
CWE-384
|
Medium
|
Jenkins Session Fixation Vulnerability (CVE-2021-21671)
|
CVE-2021-21671
CWE-384
|
CWE-384
|
High
|
Jenkins Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2021-21615)
|
CVE-2021-21615
CWE-367
|
CWE-367
|
Medium
|
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785)
|
CVE-2012-0785
CWE-400
|
CWE-400
|
High
|
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
|
CVE-2021-28165
CWE-400
|
CWE-400
|
High
|
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-43497)
|
CVE-2023-43497
CWE-434
|
CWE-434
|
High
|
Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099)
|
CVE-2020-2099
CWE-330
|
CWE-330
|
High
|
Jenkins user enumeration
|
CWE-200
|
CWE-200
|
Low
|
Jenkins weak password
|
CWE-200
|
CWE-200
|
High
|
JetBrains .idea project directory
|
CWE-538
|
CWE-538
|
Medium
|
JetLeak vulnerability
|
CVE-2015-2080
CWE-200
|
CWE-200
|
High
|
Jetpack 2.9.3: Critical Security Update
|
CVE-2014-0173
CWE-287
|
CWE-287
|
High
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-26048)
|
CVE-2023-26048
CWE-770
|
CWE-770
|
Medium
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-6762)
|
CVE-2024-6762
CWE-770
|
CWE-770
|
Medium
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-8184)
|
CVE-2024-8184
CWE-770
|
CWE-770
|
Medium
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-22201)
|
CVE-2024-22201
CWE-770
|
CWE-770
|
High
|
Jetty ConcatServlet Information Disclosure (CVE-2021-28169)
|
CVE-2021-28169
CWE-200
|
CWE-200
|
Medium
|
Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656)
|
CVE-2017-7656
|
|
High
|
Jetty CVE-2018-12536 Vulnerability (CVE-2018-12536)
|
CVE-2018-12536
|
|
Medium
|
Jetty CVE-2020-27218 Vulnerability (CVE-2020-27218)
|
CVE-2020-27218
|
|
Medium
|
Jetty CVE-2023-26049 Vulnerability (CVE-2023-26049)
|
CVE-2023-26049
|
|
Medium
|
Jetty CVE-2023-40167 Vulnerability (CVE-2023-40167)
|
CVE-2023-40167
|
|
Medium
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045)
|
CVE-2009-5045
CWE-200
|
CWE-200
|
High
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080)
|
CVE-2015-2080
CWE-200
|
CWE-200
|
High
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-28169)
|
CVE-2021-28169
CWE-200
|
CWE-200
|
Medium
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429)
|
CVE-2021-34429
CWE-200
|
CWE-200
|
Medium
|
Jetty Improper Access Control Vulnerability (CVE-2016-4800)
|
CVE-2016-4800
CWE-284
|
CWE-284
|
Critical
|
Jetty Improper Input Validation Vulnerability (CVE-2022-2047)
|
CVE-2022-2047
CWE-20
|
CWE-20
|
Low
|
Jetty Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-28163)
|
CVE-2021-28163
CWE-59
|
CWE-59
|
Low
|
Jetty Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-5046)
|
CVE-2009-5046
CWE-707
|
CWE-707
|
Medium
|
Jetty Improper Neutralization of Quoting Syntax Vulnerability (CVE-2023-36479)
|
CVE-2023-36479
CWE-149
|
CWE-149
|
Medium
|
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191)
|
CVE-2022-2191
CWE-404
|
CWE-404
|
High
|
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-5047)
|
CVE-2009-5047
CWE-119
|
CWE-119
|
Critical
|
Jetty Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7658)
|
CVE-2017-7658
CWE-444
|
CWE-444
|
Critical
|
Jetty Information Disclosure (CVE-2021-34429)
|
CVE-2021-34429
CVE-2021-28164
CWE-200
|
CWE-200
|
Medium
|
Jetty Insufficient Session Expiration Vulnerability (CVE-2021-34428)
|
CVE-2021-34428
CWE-613
|
CWE-613
|
Low
|
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2017-7657)
|
CVE-2017-7657
CWE-190
|
CWE-190
|
Critical
|
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478)
|
CVE-2023-36478
CWE-190
|
CWE-190
|
High
|
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735)
|
CVE-2017-9735
CWE-203
|
CWE-203
|
High
|
Jetty Other Vulnerability (CVE-2020-27216)
|
CVE-2020-27216
|
|
High
|
Jetty Other Vulnerability (CVE-2024-6763)
|
CVE-2024-6763
|
|
Medium
|
Jetty Session Fixation Vulnerability (CVE-2018-12538)
|
CVE-2018-12538
CWE-384
|
CWE-384
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223)
|
CVE-2020-27223
CWE-400
|
CWE-400
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
|
CVE-2021-28165
CWE-400
|
CWE-400
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048)
|
CVE-2022-2048
CWE-400
|
CWE-400
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
|
CVE-2023-44487
CWE-400
|
CWE-400
|
High
|
Jetty Weak Authentication Vulnerability (CVE-2023-41900)
|
CVE-2023-41900
|
|
Medium
|
Jira Projects accessible anonymously
|
CWE-200
|
CWE-200
|
Low
|
Jira QueryComponent Information Disclosure (CVE-2020-14179)
|
CVE-2020-14179
CWE-288
|
CWE-288
|
Medium
|
JIRA Security Advisory 2012-08-28
|
CWE-79
|
CWE-79
|
High
|
JIRA Security Advisory 2013-02-21
|
CWE-22
|
CWE-22
|
High
|
JIRA Security Advisory 2014-02-26
|
CWE-22
|
CWE-22
|
High
|
Jira Seraph Authentication Bypass (CVE-2022-0540)
|
CVE-2022-0540
CWE-288
|
CWE-288
|
Critical
|
Jira SSTI CVE-2019-11581
|
CVE-2019-11581
CWE-22
|
CWE-22
|
High
|
Jira Unauthorized SSRF via REST API
|
CVE-2019-8451
CWE-918
|
CWE-918
|
High
|
Jira Unauthorized User Enumeration (CVE-2020-14181)
|
CVE-2020-14181
CWE-200
|
CWE-200
|
Medium
|
Jira Unauthorized User Enumeration via UserPickerBrowser
|
CWE-200
|
CWE-200
|
Low
|