Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jenkins Inadequate Encryption Strength Vulnerability (CVE-2017-2598)
|
CVE-2017-2598
CWE-326
|
CWE-326
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2017-2599)
|
CVE-2017-2599
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2017-2611)
|
CVE-2017-2611
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999003)
|
CVE-2018-1999003
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999004)
|
CVE-2018-1999004
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999047)
|
CVE-2018-1999047
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2020-2104)
|
CVE-2020-2104
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2021-21609)
|
CVE-2021-21609
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2021-21670)
|
CVE-2021-21670
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Authorization Vulnerability (CVE-2023-27903)
|
CVE-2023-27903
CWE-863
|
CWE-863
|
Medium
|
Jenkins Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2017-2612)
|
CVE-2017-2612
CWE-732
|
CWE-732
|
Medium
|
Jenkins Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1000864)
|
CVE-2018-1000864
CWE-835
|
CWE-835
|
Medium
|
Jenkins Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1999044)
|
CVE-2018-1999044
CWE-835
|
CWE-835
|
Medium
|
Jenkins Missing Authorization Vulnerability (CVE-2017-1000400)
|
CVE-2017-1000400
CWE-862
|
CWE-862
|
Medium
|
Jenkins Missing Authorization Vulnerability (CVE-2019-10354)
|
CVE-2019-10354
CWE-862
|
CWE-862
|
Medium
|
Jenkins Missing Authorization Vulnerability (CVE-2024-43045)
|
CVE-2024-43045
CWE-862
|
CWE-862
|
Medium
|
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-2101)
|
CVE-2020-2101
|
|
Medium
|
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-2102)
|
CVE-2020-2102
|
|
Medium
|
Jenkins open user registration
|
CWE-200
|
CWE-200
|
Medium
|
Jenkins Other Vulnerability (CVE-2015-5319)
|
CVE-2015-5319
|
|
Medium
|
Jenkins Other Vulnerability (CVE-2020-2100)
|
CVE-2020-2100
|
|
Medium
|
Jenkins Other Vulnerability (CVE-2022-2048)
|
CVE-2022-2048
|
|
Medium
|
Jenkins Passwords transmitted in plain text (CVE-2020-2251)
|
CVE-2020-2251
|
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-7330)
|
CVE-2013-7330
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2058)
|
CVE-2014-2058
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3663)
|
CVE-2014-3663
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3665)
|
CVE-2014-3665
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1806)
|
CVE-2015-1806
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1810)
|
CVE-2015-1810
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5323)
|
CVE-2015-5323
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5324)
|
CVE-2015-5324
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3722)
|
CVE-2016-3722
CWE-264
|
CWE-264
|
Medium
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3725)
|
CVE-2016-3725
CWE-264
|
CWE-264
|
Medium
|
Jenkins Resource Management Errors Vulnerability (CVE-2014-3661)
|
CVE-2014-3661
|
|
Medium
|
Jenkins Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-1000067)
|
CVE-2018-1000067
CWE-918
|
CWE-918
|
Medium
|
Jenkins Session Fixation Vulnerability (CVE-2018-1000409)
|
CVE-2018-1000409
CWE-384
|
CWE-384
|
Medium
|
Jenkins Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2021-21615)
|
CVE-2021-21615
CWE-367
|
CWE-367
|
Medium
|
JetBrains .idea project directory
|
CWE-538
|
CWE-538
|
Medium
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-26048)
|
CVE-2023-26048
CWE-770
|
CWE-770
|
Medium
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-6762)
|
CVE-2024-6762
CWE-770
|
CWE-770
|
Medium
|
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2024-8184)
|
CVE-2024-8184
CWE-770
|
CWE-770
|
Medium
|
Jetty ConcatServlet Information Disclosure (CVE-2021-28169)
|
CVE-2021-28169
CWE-200
|
CWE-200
|
Medium
|
Jetty CVE-2018-12536 Vulnerability (CVE-2018-12536)
|
CVE-2018-12536
|
|
Medium
|
Jetty CVE-2020-27218 Vulnerability (CVE-2020-27218)
|
CVE-2020-27218
|
|
Medium
|
Jetty CVE-2023-26049 Vulnerability (CVE-2023-26049)
|
CVE-2023-26049
|
|
Medium
|
Jetty CVE-2023-40167 Vulnerability (CVE-2023-40167)
|
CVE-2023-40167
|
|
Medium
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-28169)
|
CVE-2021-28169
CWE-200
|
CWE-200
|
Medium
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429)
|
CVE-2021-34429
CWE-200
|
CWE-200
|
Medium
|
Jetty Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-5046)
|
CVE-2009-5046
CWE-707
|
CWE-707
|
Medium
|
Jetty Improper Neutralization of Quoting Syntax Vulnerability (CVE-2023-36479)
|
CVE-2023-36479
CWE-149
|
CWE-149
|
Medium
|
Jetty Information Disclosure (CVE-2021-34429)
|
CVE-2021-34429
CVE-2021-28164
CWE-200
|
CWE-200
|
Medium
|
Jetty Other Vulnerability (CVE-2024-6763)
|
CVE-2024-6763
|
|
Medium
|
Jetty Weak Authentication Vulnerability (CVE-2023-41900)
|
CVE-2023-41900
|
|
Medium
|
Jira QueryComponent Information Disclosure (CVE-2020-14179)
|
CVE-2020-14179
CWE-288
|
CWE-288
|
Medium
|
Jira Unauthorized User Enumeration (CVE-2020-14181)
|
CVE-2020-14181
CWE-200
|
CWE-200
|
Medium
|
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-0168)
|
CVE-2014-0168
CWE-352
|
CWE-352
|
Medium
|
Jolokia Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1000129)
|
CVE-2018-1000129
CWE-707
|
CWE-707
|
Medium
|
Joomla! Core improper access check in webservice endpoints
|
CVE-2023-23752
CWE-200
|
CWE-200
|
Medium
|
Joomla Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2018-11324)
|
CVE-2018-11324
CWE-362
|
CWE-362
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) (CVE-2021-26033)
|
CVE-2021-26033
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2009-1280)
|
CVE-2009-1280
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5397)
|
CVE-2015-5397
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8563)
|
CVE-2015-8563
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-15695)
|
CVE-2020-15695
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-15700)
|
CVE-2020-15700
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-35615)
|
CVE-2020-35615
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-26034)
|
CVE-2021-26034
CWE-352
|
CWE-352
|
Medium
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-23750)
|
CVE-2023-23750
CWE-352
|
CWE-352
|
Medium
|
Joomla Cryptographic Issues Vulnerability (CVE-2008-4122)
|
CVE-2008-4122
|
|
Medium
|
Joomla Cryptographic Issues Vulnerability (CVE-2011-4321)
|
CVE-2011-4321
|
|
Medium
|
Joomla CVE-2009-3945 Vulnerability (CVE-2009-3945)
|
CVE-2009-3945
|
|
Medium
|
Joomla CVE-2012-0819 Vulnerability (CVE-2012-0819)
|
CVE-2012-0819
|
|
Medium
|
Joomla CVE-2012-0821 Vulnerability (CVE-2012-0821)
|
CVE-2012-0821
|
|
Medium
|
Joomla CVE-2012-0835 Vulnerability (CVE-2012-0835)
|
CVE-2012-0835
|
|
Medium
|
Joomla CVE-2012-0836 Vulnerability (CVE-2012-0836)
|
CVE-2012-0836
|
|
Medium
|