Severity Critical High Medium Low Informational Vulnerability Categories Abuse Of Functionality Acumonitor Arbitrary File Creation Authentication Bypass Bruteforce Possible Buffer Overflow CSRF CSTI Code Execution Configuration Crlf Injection Deepscan Default Credentials Denial-of-service Dev Files Directory Listing Directory Traversal Eli Injection Error Handling File Inclusion Http Parameter Pollution Http Response Splitting Information Disclosure Insecure Admin Access Insecure Deserialization Internal Ip Disclosure Known Vulnerabilitie Known Vulnerabilities Ldap Injection Malware Missing Update Privilege Escalation Remote Code Execution SSRF SSTI Sensitive Data Not Over Ssl Server Side Template Injection Session Fixation Source Code Disclosure Sql Injection Test Files Unauthenticated File Upload Url Redirection Weak Credentials Weak Crypto XFS XSS XXE Xpath Injection Vulnerability Name CVE CWE CWE Severity Jenkins Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2017-1000503) CVE-2017-1000503 CWE-362 CWE-362 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537) CVE-2015-7537 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000356) CVE-2017-1000356 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000504) CVE-2017-1000504 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10353) CVE-2019-10353 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10384) CVE-2019-10384 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-2160) CVE-2020-2160 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-35141) CVE-2023-35141 CWE-352 CWE-352 High Jenkins CVE-2013-0329 Vulnerability (CVE-2013-0329) CVE-2013-0329 High Jenkins CVE-2014-2063 Vulnerability (CVE-2014-2063) CVE-2014-2063 High Jenkins CVE-2015-7538 Vulnerability (CVE-2015-7538) CVE-2015-7538 High Jenkins CVE-2023-43498 Vulnerability (CVE-2023-43498) CVE-2023-43498 High Jenkins CVE-2023-44487 Vulnerability (CVE-2023-44487) CVE-2023-44487 High Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-2608) CVE-2017-2608 CWE-502 CWE-502 High Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2021-21604) CVE-2021-21604 CWE-502 CWE-502 High Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2022-0538) CVE-2022-0538 CWE-502 CWE-502 High Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1000410) CVE-2018-1000410 CWE-200 CWE-200 High Jenkins Git Plugin missing permission check (CVE-2022-36883) CVE-2022-36883 CWE-862 CWE-862 High Jenkins Improper Access Control Vulnerability (CVE-2015-5325) CVE-2015-5325 CWE-284 CWE-284 High Jenkins Improper Authentication Vulnerability (CVE-2017-1000354) CVE-2017-1000354 CWE-287 CWE-287 High Jenkins Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2024-43044) CVE-2024-43044 CWE-754 CWE-754 High Jenkins Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-3666) CVE-2014-3666 CWE-94 CWE-94 High Jenkins Improper Input Validation Vulnerability (CVE-2012-4438) CVE-2012-4438 CWE-20 CWE-20 High Jenkins Improper Input Validation Vulnerability (CVE-2016-0792) CVE-2016-0792 CWE-20 CWE-20 High Jenkins Improper Input Validation Vulnerability (CVE-2017-1000391) CVE-2017-1000391 CWE-20 CWE-20 High Jenkins Improper Input Validation Vulnerability (CVE-2017-1000394) CVE-2017-1000394 CWE-20 CWE-20 High Jenkins Improper Input Validation Vulnerability (CVE-2018-1999001) CVE-2018-1999001 CWE-20 CWE-20 High Jenkins Improper Input Validation Vulnerability (CVE-2018-1999002) CVE-2018-1999002 CWE-20 CWE-20 High Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000194) CVE-2018-1000194 CWE-22 CWE-22 High Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000863) CVE-2018-1000863 CWE-22 CWE-22 High Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21605) CVE-2021-21605 CWE-22 CWE-22 High Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-21686) CVE-2021-21686 CWE-59 CWE-59 High Jenkins Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2017-1000393) CVE-2017-1000393 CWE-138 CWE-138 High Jenkins Incorrect Authorization Vulnerability (CVE-2022-34175) CVE-2022-34175 CWE-863 CWE-863 High Jenkins Incorrect Authorization Vulnerability (CVE-2023-27899) CVE-2023-27899 CWE-863 CWE-863 High Jenkins Incorrect Default Permissions Vulnerability (CVE-2023-43496) CVE-2023-43496 CWE-276 CWE-276 High Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003003) CVE-2019-1003003 CWE-613 CWE-613 High Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003004) CVE-2019-1003004 CWE-613 CWE-613 High Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003049) CVE-2019-1003049 CWE-613 CWE-613 High Jenkins Insufficient Verification of Data Authenticity Vulnerability (CVE-2015-7539) CVE-2015-7539 CWE-345 CWE-345 High Jenkins Integer Overflow or Wraparound Vulnerability (CVE-2023-36478) CVE-2023-36478 CWE-190 CWE-190 High Jenkins Missing Authorization Vulnerability (CVE-2021-21688) CVE-2021-21688 CWE-862 CWE-862 High Jenkins Missing Authorization Vulnerability (CVE-2021-21695) CVE-2021-21695 CWE-862 CWE-862 High Jenkins Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2018-1999043) CVE-2018-1999043 CWE-772 CWE-772 High Jenkins Observable Discrepancy Vulnerability (CVE-2022-34174) CVE-2022-34174 CWE-203 CWE-203 High Jenkins Origin Validation Error Vulnerability (CVE-2024-23898) CVE-2024-23898 CWE-346 CWE-346 High Jenkins Other Vulnerability (CVE-2016-3726) CVE-2016-3726 High Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814) CVE-2015-1814 CWE-264 CWE-264 High Jenkins Session Fixation Vulnerability (CVE-2021-21671) CVE-2021-21671 CWE-384 CWE-384 High Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785) CVE-2012-0785 CWE-400 CWE-400 High Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165 CWE-400 CWE-400 High Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-43497) CVE-2023-43497 CWE-434 CWE-434 High Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099) CVE-2020-2099 CWE-330 CWE-330 High Jenkins weak password CWE-200 CWE-200 High JetLeak vulnerability CVE-2015-2080 CWE-200 CWE-200 High Jetpack 2.9.3: Critical Security Update CVE-2014-0173 CWE-287 CWE-287 High Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656) CVE-2017-7656 High Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045) CVE-2009-5045 CWE-200 CWE-200 High Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080) CVE-2015-2080 CWE-200 CWE-200 High Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191) CVE-2022-2191 CWE-404 CWE-404 High Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478) CVE-2023-36478 CWE-190 CWE-190 High Jetty Observable Discrepancy Vulnerability (CVE-2017-9735) CVE-2017-9735 CWE-203 CWE-203 High Jetty Other Vulnerability (CVE-2020-27216) CVE-2020-27216 High Jetty Session Fixation Vulnerability (CVE-2018-12538) CVE-2018-12538 CWE-384 CWE-384 High Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223) CVE-2020-27223 CWE-400 CWE-400 High Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165 CWE-400 CWE-400 High Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048) CVE-2022-2048 CWE-400 CWE-400 High Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487) CVE-2023-44487 CWE-400 CWE-400 High JIRA Security Advisory 2012-08-28 CWE-79 CWE-79 High JIRA Security Advisory 2013-02-21 CWE-22 CWE-22 High JIRA Security Advisory 2014-02-26 CWE-22 CWE-22 High Jira SSTI CVE-2019-11581 CVE-2019-11581 CWE-22 CWE-22 High Jira Unauthorized SSRF via REST API CVE-2019-8451 CWE-918 CWE-918 High Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10899) CVE-2018-10899 CWE-352 CWE-352 High Jolokia XML External Entity (XXE) vulnerability CWE-611 CWE-611 High 1...17181920...165 18 / 165