jenkins vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jenkins package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-jv82-75fh-23r7 dsfsdf

<2.487-r0
  • L
CVE-2024-52549 dsfsdf

<2.487-r0
  • L
GHSA-4gc7-5j7h-4qph dsfsdf

<2.484-r0
  • L
GHSA-c4q5-6c82-3qpw dsfsdf

<2.484-r0
  • L
CVE-2024-38821 dsfsdf

<2.484-r0
  • M
CVE-2024-38820 dsfsdf

<2.484-r0
  • L
CVE-2024-38808 dsfsdf

<2.473-r0
  • L
GHSA-9cmq-m9j5-mvww dsfsdf

<2.473-r0
  • L
GHSA-h856-ffvv-xvr4 dsfsdf

<2.472-r0
  • H
Improper Check for Unusual or Exceptional Conditions dsfsdf

<2.472-r0
  • L
GHSA-8pv9-qh96-9hc6 dsfsdf

<2.471-r0
  • M
Missing Authorization dsfsdf

<2.471-r0
  • L
CVE-2024-39458 dsfsdf

<2.464-r2
  • L
GHSA-xfx3-cr74-x3cv dsfsdf

<2.464-r2
  • L
CVE-2024-30171 dsfsdf

<2.459-r0
  • L
GHSA-m44j-cfrm-g8qc dsfsdf

<2.459-r0
  • L
GHSA-8xfc-gm6g-vgpv dsfsdf

<2.459-r0
  • L
CVE-2024-30172 dsfsdf

<2.459-r0
  • L
GHSA-v435-xc8x-wvr9 dsfsdf

<2.459-r0
  • L
GHSA-4h8f-2wvx-gg5w dsfsdf

<2.459-r0
  • L
CVE-2024-34447 dsfsdf

<2.459-r0
  • L
CVE-2024-29857 dsfsdf

<2.459-r0
  • L
GHSA-v63g-v339-2673 dsfsdf

<2.458-r0
  • L
CVE-2024-34144 dsfsdf

<2.458-r0
  • L
CVE-2024-34145 dsfsdf

<2.458-r0
  • L
GHSA-2g4q-9vm9-9fw4 dsfsdf

<2.458-r0
  • L
GHSA-f3jh-qvm4-mg39 dsfsdf

<2.450-r0
  • L
GHSA-hgjh-9rj2-g67j dsfsdf

<2.450-r0
  • L
CVE-2024-22257 dsfsdf

<2.450-r0
  • L
CVE-2024-22259 dsfsdf

<2.450-r0
  • L
GHSA-4g9r-vxhx-9pgx dsfsdf

<2.447-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop') dsfsdf

<2.447-r0
  • L
GHSA-4265-ccf5-phj5 dsfsdf

<2.447-r0
  • M
Allocation of Resources Without Limits or Throttling dsfsdf

<2.447-r0
  • L
CVE-2024-22243 dsfsdf

<2.446-r0
  • L
GHSA-ccgv-vj62-xf9h dsfsdf

<2.446-r0
  • L
GHSA-cjgm-9vc9-56mx dsfsdf

<2.443-r0
  • M
CVE-2024-23900 dsfsdf

<2.443-r0
  • C
Directory Traversal dsfsdf

<2.442-r0
  • L
GHSA-6f9g-cxwr-q5jr dsfsdf

<2.442-r0
  • L
GHSA-r4q3-7g4q-x89m dsfsdf

<2.442-r0
  • H
CVE-2024-22233 dsfsdf

<2.442-r0
  • L
GHSA-rrgp-c2w8-6vg6 dsfsdf

<2.395-r0
  • L
GHSA-cj6r-8pxj-5jv6 dsfsdf

<2.395-r0
  • L
GHSA-hf9h-vv4m-2f33 dsfsdf

<2.395-r0
  • L
GHSA-j664-qhh4-hpf8 dsfsdf

<2.395-r0
  • L
GHSA-584m-7r4m-8j6v dsfsdf

<2.395-r0
  • L
GHSA-hfrx-6qgj-fp6c dsfsdf

<2.395-r0
  • M
CVE-2023-27902 dsfsdf

<2.395-r0
  • H
Incorrect Authorization dsfsdf

<2.395-r0
  • M
Incorrect Authorization dsfsdf

<2.395-r0
  • H
Allocation of Resources Without Limits or Throttling dsfsdf

<2.395-r0
  • M
CVE-2023-27904 dsfsdf

<2.395-r0
  • C
Cross-site Scripting (XSS) dsfsdf

<2.395-r0