Jenkins

Jenkins

256 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Medienbericht Exploit
  • EPSS 94.47%
  • Veröffentlicht 24.01.2024 18:15:09
  • Zuletzt bearbeitet 24.10.2025 14:49:09

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitra...

  • EPSS 36.61%
  • Veröffentlicht 24.01.2024 18:15:09
  • Zuletzt bearbeitet 21.11.2024 08:58:39

Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, al...

Exploit
  • EPSS 2.34%
  • Veröffentlicht 10.10.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:09:47

Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their ...

Warnung Medienbericht Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 44.44%
  • Veröffentlicht 20.09.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:24:09

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permi...

  • EPSS 1.89%
  • Veröffentlicht 20.09.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:24:09

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control th...

  • EPSS 0.19%
  • Veröffentlicht 20.09.2023 17:15:11
  • Zuletzt bearbeitet 02.05.2025 16:15:22

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the ...

  • EPSS 0.07%
  • Veröffentlicht 20.09.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:24:09

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowin...

  • EPSS 0.08%
  • Veröffentlicht 20.09.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:24:09

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing ...

  • EPSS 1.87%
  • Veröffentlicht 26.07.2023 14:15:10
  • Zuletzt bearbeitet 21.11.2024 08:14:48

Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control...