Jenkins

Jenkins

256 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 14.06.2023 13:15:11
  • Zuletzt bearbeitet 02.01.2025 20:16:03

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request t...

  • EPSS 1.98%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:34

Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resul...

  • EPSS 0.02%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:35

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access t...

  • EPSS 0.4%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:35

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing atta...

  • EPSS 0.4%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:35

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attacker...

  • EPSS 0.5%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:35

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents.

  • EPSS 0.06%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:35

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with a...

  • EPSS 0.37%
  • Veröffentlicht 10.03.2023 21:15:15
  • Zuletzt bearbeitet 28.02.2025 19:15:35

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.

  • EPSS 3.36%
  • Veröffentlicht 21.09.2022 16:15:09
  • Zuletzt bearbeitet 28.05.2025 16:15:28

Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to contr...

  • EPSS 1.29%
  • Veröffentlicht 07.07.2022 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:13

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service s...