Vulnerability Name CVE Severity
Jenkins Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2017-1000503) CVE-2017-1000503
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537) CVE-2015-7537
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000356) CVE-2017-1000356
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000504) CVE-2017-1000504
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10353) CVE-2019-10353
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10384) CVE-2019-10384
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-2160) CVE-2020-2160
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-35141) CVE-2023-35141
Jenkins CVE-2013-0329 Vulnerability (CVE-2013-0329) CVE-2013-0329
Jenkins CVE-2014-2063 Vulnerability (CVE-2014-2063) CVE-2014-2063
Jenkins CVE-2015-7538 Vulnerability (CVE-2015-7538) CVE-2015-7538
Jenkins CVE-2023-43498 Vulnerability (CVE-2023-43498) CVE-2023-43498
Jenkins CVE-2023-44487 Vulnerability (CVE-2023-44487) CVE-2023-44487
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-2608) CVE-2017-2608
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2021-21604) CVE-2021-21604
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2022-0538) CVE-2022-0538
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1000410) CVE-2018-1000410
Jenkins Git Plugin missing permission check (CVE-2022-36883) CVE-2022-36883
Jenkins Improper Access Control Vulnerability (CVE-2015-5325) CVE-2015-5325
Jenkins Improper Authentication Vulnerability (CVE-2017-1000354) CVE-2017-1000354
Jenkins Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2024-43044) CVE-2024-43044
Jenkins Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-3666) CVE-2014-3666
Jenkins Improper Input Validation Vulnerability (CVE-2012-4438) CVE-2012-4438
Jenkins Improper Input Validation Vulnerability (CVE-2016-0792) CVE-2016-0792
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000391) CVE-2017-1000391
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000394) CVE-2017-1000394
Jenkins Improper Input Validation Vulnerability (CVE-2018-1999001) CVE-2018-1999001
Jenkins Improper Input Validation Vulnerability (CVE-2018-1999002) CVE-2018-1999002
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000194) CVE-2018-1000194
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000863) CVE-2018-1000863
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21605) CVE-2021-21605
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-21686) CVE-2021-21686
Jenkins Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2017-1000393) CVE-2017-1000393
Jenkins Incorrect Authorization Vulnerability (CVE-2022-34175) CVE-2022-34175
Jenkins Incorrect Authorization Vulnerability (CVE-2023-27899) CVE-2023-27899
Jenkins Incorrect Default Permissions Vulnerability (CVE-2023-43496) CVE-2023-43496
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003003) CVE-2019-1003003
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003004) CVE-2019-1003004
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003049) CVE-2019-1003049
Jenkins Insufficient Verification of Data Authenticity Vulnerability (CVE-2015-7539) CVE-2015-7539
Jenkins Integer Overflow or Wraparound Vulnerability (CVE-2023-36478) CVE-2023-36478
Jenkins Missing Authorization Vulnerability (CVE-2021-21688) CVE-2021-21688
Jenkins Missing Authorization Vulnerability (CVE-2021-21695) CVE-2021-21695
Jenkins Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2018-1999043) CVE-2018-1999043
Jenkins Observable Discrepancy Vulnerability (CVE-2022-34174) CVE-2022-34174
Jenkins Origin Validation Error Vulnerability (CVE-2024-23898) CVE-2024-23898
Jenkins Other Vulnerability (CVE-2016-3726) CVE-2016-3726
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814) CVE-2015-1814
Jenkins Session Fixation Vulnerability (CVE-2021-21671) CVE-2021-21671
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785) CVE-2012-0785
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-43497) CVE-2023-43497
Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099) CVE-2020-2099
Jenkins weak password
JetLeak vulnerability CVE-2015-2080
Jetpack 2.9.3: Critical Security Update CVE-2014-0173
Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656) CVE-2017-7656
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045) CVE-2009-5045
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080) CVE-2015-2080
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191) CVE-2022-2191
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478) CVE-2023-36478
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735) CVE-2017-9735
Jetty Other Vulnerability (CVE-2020-27216) CVE-2020-27216
Jetty Session Fixation Vulnerability (CVE-2018-12538) CVE-2018-12538
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223) CVE-2020-27223
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048) CVE-2022-2048
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487) CVE-2023-44487
JIRA Security Advisory 2012-08-28
JIRA Security Advisory 2013-02-21
JIRA Security Advisory 2014-02-26
Jira SSTI CVE-2019-11581 CVE-2019-11581
Jira Unauthorized SSRF via REST API CVE-2019-8451
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10899) CVE-2018-10899
Jolokia XML External Entity (XXE) vulnerability