jenkins vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jenkins package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • M
Out-of-bounds Write

*
  • H
Incorrect Authorization

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Insufficient Session Expiration

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Files or Directories Accessible to External Parties

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • H
Improper Access Control

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Unprotected Transport of Credentials

*
  • H
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Incomplete Cleanup

*
  • M
Integer Overflow or Wraparound

*
  • M
Insufficient Granularity of Access Control

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Privilege Management

*
  • M
Open Redirect

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Insufficient Resource Pool

*
  • M
Resource Exhaustion

*
  • M
Improper Validation of Integrity Check Value

*
  • H
Improper Access Control

*
  • H
Improper Access Control

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

*
  • H
Incorrect Authorization

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Input Validation

*
  • L
Missing Required Cryptographic Step

*
  • L
Missing Required Cryptographic Step

*
  • L
Cross-site Scripting (XSS)

*
  • L
Information Exposure Through Log Files

*
  • L
Cross-site Scripting (XSS)

*
  • L
Improper Input Validation

*
  • L
Security Features

*
  • L
Security Features

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Permissive Regular Expression

*
  • M
Permissive Regular Expression

*
  • M
Permissive Regular Expression

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Authentication

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Missing Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authorization

*
  • M
Missing Authorization

*
  • M
Improper Input Validation

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • H
Directory Traversal

*
  • H
Deserialization of Untrusted Data

*
  • M
CVE-2014-2063

*
  • M
Insufficient Session Expiration

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Session Fixation

*
  • M
Incorrect Authorization

*
  • M
CVE-2014-2060

*
  • M
Information Exposure

*
  • M
Directory Traversal

*
  • M
Improper Input Validation

*
  • L
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Insufficient Session Expiration

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Resource Exhaustion

*
  • M
Session Fixation

*
  • M
Resource Exhaustion

*
  • M
Session Fixation

*
  • M
Resource Exhaustion

*
  • M
Session Fixation

*
  • M
Resource Exhaustion

*
  • M
Session Fixation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • H
Deserialization of Untrusted Data

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Insufficiently Protected Credentials

*
  • M
Static Code Injection

*
  • M
Improper Check for Dropped Privileges

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Preservation of Permissions

*
  • M
Improper Preservation of Permissions

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Information Exposure

*
  • M
Incorrect Authorization

*
  • M
Information Exposure

*
  • H
Information Exposure

*
  • H
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • H
Execution with Unnecessary Privileges

*
  • M
Improper Authorization

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Resource Shutdown or Release

*
  • M
Incorrect Privilege Assignment

*
  • M
Incorrect Privilege Assignment

*
  • H
Cross-site Scripting (XSS)

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • L
Incorrect Privilege Assignment

*
  • L
Information Exposure

*
  • H
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • H
Protection Mechanism Failure

*
  • H
Protection Mechanism Failure

*
  • C
Arbitrary Argument Injection

*
  • C
Directory Traversal

*