jenkins vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jenkins package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Integer Overflow or Wraparound

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • M
Cross-site Scripting (XSS)

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
Permissive Regular Expression

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Incomplete Cleanup

*
  • H
Cross-site Scripting (XSS)

*
  • M
Files or Directories Accessible to External Parties

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Out-of-bounds Write

<0:2.401.1.1685677065-1.el8
  • H
Cross-site Scripting (XSS)

<0:2.401.1.1685677065-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.401.1.1685677065-1.el8
  • H
Incorrect Privilege Assignment

<0:2.401.1.1685677065-1.el8
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

<0:2.289.1.1624020353-1.el8
  • M
Incorrect Privilege Assignment

*
  • C
Incorrect Privilege Assignment

<0:2.387.1.1680701869-1.el8
  • C
Cross-site Scripting (XSS)

<0:2.387.1.1680701869-1.el8
  • C
Directory Traversal

<0:2.361.1.1675668150-1.el8
  • C
Directory Traversal

<0:2.361.1.1675668150-1.el8
  • M
Improper Resource Shutdown or Release

*
  • C
Information Exposure

<0:2.387.1.1680701869-1.el8
  • M
Improper Resource Shutdown or Release

*
  • C
Cross-site Scripting (XSS)

<0:2.361.1.1675668150-1.el8
  • C
Cross-site Scripting (XSS)

<0:2.361.1.1675668150-1.el8
  • C
Reversible One-Way Hash

<0:2.361.1.1675668150-1.el8
  • C
Reversible One-Way Hash

<0:2.361.1.1675668150-1.el8
  • C
Creation of Temporary File With Insecure Permissions

<0:2.387.1.1680701869-1.el8
  • C
Improper Input Validation

<0:2.387.1.1680701869-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Inappropriate Encoding for Output Context

<0:2.361.1.1675668150-1.el8
  • C
Inappropriate Encoding for Output Context

<0:2.361.1.1675668150-1.el8
  • C
Cross-site Scripting (XSS)

<0:2.361.1.1675668150-1.el8
  • C
Cross-site Scripting (XSS)

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Inappropriate Encoding for Output Context

<0:2.361.1.1675668150-1.el8
  • C
Inappropriate Encoding for Output Context

<0:2.361.1.1675668150-1.el8
  • C
Information Exposure

<0:2.361.1.1675668150-1.el8
  • H
Information Exposure

<0:2.361.1.1675406172-1.el8
  • H
Information Exposure

<0:2.361.1.1672840472-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • C
Protection Mechanism Failure

<0:2.361.1.1675668150-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.361.1.1672840472-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:2.361.1.1675668150-1.el8
  • C
Missing Authorization

<0:2.361.1.1675668150-1.el8
  • H
Missing Authorization

<0:2.361.1.1672840472-1.el8
  • C
Missing Authorization

<0:2.361.1.1675668150-1.el8
  • H
Missing Authorization

<0:2.361.1.1672840472-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.361.1.1672840472-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:2.361.1.1675668150-1.el8
  • H
Directory Traversal

<0:2.361.1.1672840472-1.el8
  • H
Information Exposure

<0:2.361.1.1672840472-1.el8
  • C
Information Exposure

<0:2.361.1.1675668150-1.el8
  • H
Information Exposure

<0:2.361.1.1672840472-1.el8
  • C
Information Exposure

<0:2.361.1.1675668150-1.el8
  • H
Key Exchange without Entity Authentication

<0:2.361.1.1672840472-1.el8
  • H
Cross-site Scripting (XSS)

<0:2.361.1.1672840472-1.el8
  • H
Interaction Error

<0:2.361.1.1672840472-1.el8
  • C
Files or Directories Accessible to External Parties

<0:2.361.1.1675668150-1.el8
  • H
Files or Directories Accessible to External Parties

<0:2.361.1.1672840472-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.361.1.1672840472-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:2.361.1.1675668150-1.el8
  • H
Files or Directories Accessible to External Parties

<0:2.361.1.1672840472-1.el8
  • H
Authentication Bypass

<0:2.361.1.1672840472-1.el8
  • C
Server-Side Request Forgery (SSRF)

<0:2.387.1.1680701869-1.el8
  • M
Cross-site Scripting (XSS)

*
  • H
OS Command Injection

<0:2.319.2.1643648617-1.el8
  • H
OS Command Injection

<0:2.319.2.1643964085-1.el8
  • H
OS Command Injection

<0:2.319.2.1643882372-1.el8
  • H
OS Command Injection

<0:2.319.2.1643391771-1.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:2.319.2.1643288987-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Missing Authorization

*
  • H
Cross-site Request Forgery (CSRF)

<0:2.319.2.1643391771-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.319.2.1643882372-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.319.2.1643964085-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:2.319.2.1643648617-1.el8
  • M
Improper Input Validation

<0:2.289.1.1624020353-1.el8
  • M
Improper Validation of Array Index

<0:2.289.1.1624020353-1.el8
  • M
Improper Certificate Validation

<0:2.289.1.1624020353-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597493-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597018-1.el8
  • H
Directory Traversal

<0:2.303.3.1637595827-1.el8
  • H
Directory Traversal

<0:2.303.3.1637596565-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597493-1.el8
  • H
Directory Traversal

<0:2.303.3.1637595827-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597018-1.el8
  • H
Directory Traversal

<0:2.303.3.1637596565-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597018-1.el8
  • H
Directory Traversal

<0:2.303.3.1637596565-1.el8
  • H
Directory Traversal

<0:2.303.3.1637595827-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597493-1.el8
  • M
Improper Input Validation

<0:2.277.3.1620393611-1.el8
  • M
Improper Input Validation

<0:2.289.1.1624020353-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597018-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637595827-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637596565-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597493-1.el8
  • H
Link Following

<0:2.303.3.1637597493-1.el8
  • H
Link Following

<0:2.303.3.1637595827-1.el8
  • H
Link Following

<0:2.303.3.1637597018-1.el8
  • H
Link Following

<0:2.303.3.1637596565-1.el8
  • M
Session Fixation

<0:2.289.3.1633554819-1.el8
  • M
Session Fixation

<0:2.289.2.1628252553-1.el8
  • M
Session Fixation

<0:2.289.2.1629437819-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597018-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597493-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637596565-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637595827-1.el8
  • M
Improper Preservation of Permissions

*
  • H
Link Following

<0:2.303.3.1637597493-1.el8
  • H
Link Following

<0:2.303.3.1637595827-1.el8
  • H
Link Following

<0:2.303.3.1637596565-1.el8
  • H
Link Following

<0:2.303.3.1637597018-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597018-1.el8
  • H
Directory Traversal

<0:2.303.3.1637595827-1.el8
  • H
Directory Traversal

<0:2.303.3.1637596565-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597493-1.el8
  • H
Incorrect Authorization

<0:2.303.3.1637597018-1.el8
  • H
Incorrect Authorization

<0:2.303.3.1637597493-1.el8
  • H
Incorrect Authorization

<0:2.303.3.1637595827-1.el8
  • H
Incorrect Authorization

<0:2.303.3.1637596565-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597018-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637595827-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637596565-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597493-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597493-1.el8
  • H
Directory Traversal

<0:2.303.3.1637597018-1.el8
  • H
Directory Traversal

<0:2.303.3.1637596565-1.el8
  • H
Directory Traversal

<0:2.303.3.1637595827-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.319.2.1643288987-1.el8
  • H
Improper Preservation of Permissions

<0:2.303.3.1637597493-1.el8
  • H
Improper Preservation of Permissions

<0:2.303.3.1637595827-1.el8
  • H
Improper Preservation of Permissions

<0:2.303.3.1637597018-1.el8
  • H
Improper Preservation of Permissions

<0:2.303.3.1637596565-1.el8
  • M
Improper Input Validation

<0:2.277.3.1620393611-1.el8
  • M
Improper Input Validation

<0:2.289.1.1624020353-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637596565-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597018-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637597493-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637595827-1.el8
  • H
Directory Traversal

<0:2.263.3.1612434510-1.el8
  • H
Improper Input Validation

<0:2.263.3.1612434510-1.el8
  • M
Improper Check for Dropped Privileges

<0:2.289.1.1624020353-1.el8
  • M
Incorrect Authorization

<0:2.289.3.1633554819-1.el8
  • M
Incorrect Authorization

<0:2.289.2.1629437819-1.el8
  • M
Incorrect Authorization

<0:2.289.2.1628252553-1.el8
  • H
Link Following

<0:2.303.3.1637596565-1.el8
  • H
Link Following

<0:2.303.3.1637597018-1.el8
  • H
Link Following

<0:2.303.3.1637597493-1.el8
  • H
Link Following

<0:2.303.3.1637595827-1.el8
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434510-1.el8
  • H
Incorrect Authorization

<0:2.263.3.1612434510-1.el8
  • M
Cross-site Scripting (XSS)

<0:2.289.1.1624020353-1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:2.263.3.1612434510-1.el8
  • H
Improper Input Validation

<0:2.263.3.1612434510-1.el8
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434510-1.el8
  • H
Deserialization of Untrusted Data

<0:2.263.3.1612434510-1.el8
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434510-1.el8
  • H
Link Following

<0:2.263.3.1612434510-1.el8
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434510-1.el8
  • C
Improper Authorization

<0:2.361.1.1675668150-1.el8
  • C
Improper Authorization

<0:2.361.1.1675668150-1.el8
  • M
Resource Exhaustion

<0:2.289.1.1624020353-1.el8
  • C
Deserialization of Untrusted Data

<0:2.361.1.1675668150-1.el8
  • C
Deserialization of Untrusted Data

<0:2.361.1.1675668150-1.el8
  • H
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Directory Traversal

*
  • M
Incorrect Authorization

*
  • C
Arbitrary Code Injection

<0:2.387.1.1680701869-1.el8
  • H
Insufficient Resource Pool

<0:2.361.1.1672840472-1.el8
  • C
Insufficient Resource Pool

<0:2.361.1.1675668150-1.el8
  • C
Improper Privilege Management

<0:2.387.1.1680701869-1.el8
  • H
Improper Neutralization

<0:2.401.1.1685677065-1.el8
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Buffer Overflow

<0:2.401.1.1685677065-1.el8
  • C
HTTP Request Smuggling

<0:2.387.1.1680701869-1.el8
  • C
Incorrect Authorization

<0:2.387.1.1680701869-1.el8
  • H
Improper Input Validation

<0:2.361.1.1675406172-1.el8
  • C
Improper Input Validation

<0:2.361.1.1675668150-1.el8
  • C
Improper Input Validation

<0:2.361.1.1675668150-1.el8
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • C
Resource Exhaustion

<0:2.361.1.1675668150-1.el8
  • C
Resource Exhaustion

<0:2.361.1.1675668150-1.el8
  • M
Resource Exhaustion

*
  • M
Information Exposure

<0:2.319.2.1643288987-1.el8
  • M
Resource Exhaustion

<0:2.319.2.1643288987-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.319.2.1643288987-1.el8
  • M
Improper Input Validation

<0:2.319.2.1643288987-1.el8
  • M
Incorrect Default Permissions

<0:2.289.3.1630554997-1.el8
  • H
Incorrect Default Permissions

<0:2.303.3.1637596565-1.el8
  • M
Use After Free

<0:2.289.3.1630554997-1.el8
  • M
Use After Free

<0:2.289.3.1630554997-1.el8
  • M
Information Exposure

*
  • M
Resource Exhaustion

<0:2.289.3.1633554819-1.el8
  • M
Improper Input Validation

<0:2.289.3.1633554819-1.el8
  • M
Improper Input Validation

<0:2.289.3.1633554819-1.el8
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Validation of Certificate with Host Mismatch

<0:2.319.2.1643288987-1.el8
  • M
Incorrect Calculation

<0:2.277.3.1620393611-1.el8
  • M
Incorrect Calculation

<0:2.289.1.1624020353-1.el8
  • M
Information Exposure

<0:2.289.3.1630554997-1.el8
  • M
Information Exposure

<0:2.289.3.1630554997-1.el8
  • M
Improper Certificate Validation

<0:2.277.3.1620393611-1.el8
  • L
Information Exposure

*
  • H
Insecure Temporary File

<0:2.263.3.1612434510-1.el8
  • M
Improper Input Validation

<0:2.289.3.1633554819-1.el8
  • M
Insufficient Session Expiration

<0:2.289.3.1630554997-1.el8
  • M
Insufficient Session Expiration

<0:2.289.3.1630554997-1.el8
  • M
Resource Exhaustion

<0:2.289.3.1630554997-1.el8
  • M
Resource Exhaustion

<0:2.289.3.1630554997-1.el8
  • M
Information Exposure

<0:2.277.3.1620393611-1.el8
  • M
Resource Exhaustion

<0:2.277.3.1620393611-1.el8
  • L
Incorrect Default Permissions

*
  • M
Resource Exhaustion

<0:2.277.3.1623853726-1.el8
  • M
Sensitive Information Uncleared Before Release

<0:2.277.3.1623853726-1.el8
  • M
Insecure Temporary File

<0:2.277.3.1623853726-1.el8
  • H
Insecure Temporary File

<0:2.263.3.1612434510-1.el8