jenkins vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jenkins package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Improper Validation of Integrity Check Value

*
  • C
Directory Traversal

*
  • M
Missing Authorization

*
  • H
Protection Mechanism Failure

*
  • H
Protection Mechanism Failure

*
  • M
Resource Exhaustion

*
  • H
Improper Access Control

*
  • M
Resource Exhaustion

*
  • C
Arbitrary Argument Injection

*
  • M
Directory Traversal

*
  • H
Cross-site Scripting (XSS)

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
Permissive Regular Expression

*
  • M
Permissive Regular Expression

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Files or Directories Accessible to External Parties

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

<0:1.625.3-2.el7aos
  • H
Insufficient Verification of Data Authenticity

<0:1.625.3-2.el7aos
  • H
Cross-site Request Forgery (CSRF)

<0:1.625.3-2.el7aos
  • H
Cross-site Request Forgery (CSRF)

<0:1.625.3-2.el7aos
  • H
Cross-site Scripting (XSS)

<0:1.625.3-2.el7aos
  • H
Improper Access Control

<0:1.625.3-2.el7aos
  • H
Access Restriction Bypass

<0:1.625.3-2.el7aos
  • H
Access Restriction Bypass

<0:1.625.3-2.el7aos
  • H
Directory Traversal

<0:1.625.3-2.el7aos
  • H
Information Exposure

<0:1.625.3-2.el7aos
  • H
Information Exposure

<0:1.625.3-2.el7aos
  • H
CVE-2015-5319

<0:1.625.3-2.el7aos
  • H
Cross-site Request Forgery (CSRF)

<0:1.625.3-2.el7aos
  • H
Information Exposure

<0:1.625.3-2.el7aos
  • H
Improper Access Control

<0:1.625.3-2.el7aos
  • H
Cross-site Scripting (XSS)

<0:1.625.3-2.el7aos
  • H
Cross-site Scripting (XSS)

<0:1.625.3-2.el7aos
  • H
Improper Input Validation

<0:1.625.3-2.el7aos
  • H
Improper Input Validation

<0:1.625.3-2.el7aos
  • H
Link Following

<0:1.625.3-2.el7aos
  • H
Access Restriction Bypass

<0:1.625.3-2.el7aos
  • H
Cross-site Scripting (XSS)

<0:1.625.3-2.el7aos
  • H
Information Exposure

<0:1.625.3-2.el7aos
  • H
Improper Authorization

<0:1.625.3-2.el7aos
  • H
Arbitrary Code Injection

<0:1.625.3-2.el7aos
  • H
Directory Traversal

<0:1.625.3-2.el7aos
  • H
Incorrect Authorization

<0:1.625.3-2.el7aos
  • H
Information Exposure

<0:1.625.3-2.el7aos
  • H
Resource Exhaustion

<0:1.625.3-2.el7aos
  • H
Cross-site Scripting (XSS)

<0:1.625.3-2.el7aos
  • H
Null Byte Interaction Error (Poison Null Byte)

<0:1.625.3-2.el7aos
  • H
Improper Input Validation

<0:1.642.2-1.el7
  • H
Information Exposure

<0:1.642.2-1.el7
  • H
Information Exposure

<0:1.642.2-1.el7
  • H
Improper Input Validation

<0:1.642.2-1.el7
  • H
Access Restriction Bypass

<0:1.642.2-1.el7
  • L
Information Exposure

<0:2.107.3.1525883128-1.el7
  • H
Incorrect Regular Expression

<0:2.235.2.1597220898-1.el7
  • H
Arbitrary Code Injection

<0:2.150.2.1549032159-1.el7
  • H
Arbitrary Code Injection

<0:2.150.2.1549032159-1.el7
  • M
Information Exposure

<0:1.651.2-1.el7
  • M
Information Exposure

<0:1.651.2-1.el7
  • M
CVE-2016-3726

<0:1.651.2-1.el7
  • M
CVE-2016-3726

<0:1.651.2-1.el7
  • M
Access Restriction Bypass

<0:1.651.2-1.el7
  • M
Access Restriction Bypass

<0:1.651.2-1.el7
  • M
Information Exposure

<0:1.651.2-1.el7
  • M
Information Exposure

<0:1.651.2-1.el7
  • M
Information Exposure

<0:1.651.2-1.el7
  • M
Information Exposure

<0:1.651.2-1.el7
  • M
Access Restriction Bypass

<0:1.651.2-1.el7
  • M
Access Restriction Bypass

<0:1.651.2-1.el7
  • M
Code

<0:1.651.2-1.el7
  • M
Code

<0:1.651.2-1.el7
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Improper Input Validation

<0:2.89.4.1519670652-1.el7
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • M
Improper Authentication

<0:2.73.3-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.150.2.1549032159-1.el7
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

<0:2.138.4.1544416383-1.el7
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Improper Authorization

<0:2.89.4.1519670652-1.el7
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:2.138.4.1544416383-1.el7
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

<0:2.138.4.1544416383-1.el7
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Link Following

<0:2.138.4.1544416383-1.el7
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Link Following

*
  • H
Improper Authorization

<0:1.625.3-2.el7aos
  • H
Improper Authorization

<0:1.625.3-2.el7aos
  • H
Deserialization of Untrusted Data

<0:2.204.2.1585048146-1.el7
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Information Exposure

<0:2.138.2.1542054911-1.el7
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • H
Session Fixation

<0:2.138.2.1542054911-1.el7
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:2.138.2.1542054911-1.el7
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • H
Information Exposure

<0:2.138.2.1542054911-1.el7
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • H
Static Code Injection

<0:2.150.2.1549032159-1.el7
  • H
Static Code Injection

<0:2.150.2.1549032159-1.el7
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • H
Improper Authentication

<0:2.138.2.1542054911-1.el7
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • H
Static Code Injection

<0:2.150.2.1549032159-1.el7
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • H
Session Fixation

<0:2.150.2.1549032159-1.el7
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • H
Session Fixation

<0:2.150.2.1549032159-1.el7
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Session Fixation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<0:2.164.2.1555422716-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Static Code Injection

<0:2.150.2.1549032159-1.el7
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • H
Improper Authentication

<0:2.164.2.1555422716-1.el7
  • M
Improper Authentication

*
  • H
Improper Input Validation

<0:2.138.2.1542054911-1.el7
  • M
Incorrect Privilege Assignment

*
  • M
Incorrect Privilege Assignment

*
  • L
Incorrect Privilege Assignment

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<0:2.138.2.1542054911-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Directory Traversal

<0:2.138.2.1542054911-1.el7
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Resource Shutdown or Release

*
  • L
Information Exposure

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Resource Shutdown or Release

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Link Following

<0:2.319.3.1650348949-1.el7
  • H
Incorrect Behavior Order: Early Validation

<0:2.319.3.1650348949-1.el7
  • H
Incorrect Behavior Order: Early Validation

<0:2.319.3.1650348949-1.el7
  • H
Link Following

<0:2.319.3.1650348949-1.el7
  • H
Link Following

<0:2.319.3.1650348949-1.el7
  • H
Incorrect Behavior Order: Early Validation

<0:2.319.3.1650348949-1.el7
  • H
OS Command Injection

<0:2.319.3.1650348949-1.el7
  • H
Information Exposure

<0:2.319.3.1650348949-1.el7
  • H
Insufficiently Protected Credentials

<0:2.319.3.1650348949-1.el7
  • H
Link Following

<0:2.319.3.1650348949-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
OS Command Injection

<0:2.319.3.1650348949-1.el7
  • H
OS Command Injection

<0:2.319.3.1650348949-1.el7
  • H
OS Command Injection

<0:2.319.2.1644411558-1.el7
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • H
Cross-site Request Forgery (CSRF)

<0:2.319.2.1644411558-1.el7
  • H
Directory Traversal

<0:2.303.3.1637698110-1.el7
  • H
Directory Traversal

<0:2.303.3.1637698110-1.el7
  • H
Directory Traversal

<0:2.303.3.1637698110-1.el7
  • L
Improper Input Validation

*
  • H
Incorrect Default Permissions

<0:2.303.3.1637698110-1.el7
  • H
Link Following

<0:2.303.3.1637698110-1.el7
  • M
Session Fixation

*
  • H
Incorrect Default Permissions

<0:2.303.3.1637698110-1.el7
  • M
Improper Preservation of Permissions

*
  • M
Improper Preservation of Permissions

*
  • H
Link Following

<0:2.303.3.1637698110-1.el7
  • H
Directory Traversal

<0:2.303.3.1637698110-1.el7
  • H
Incorrect Authorization

<0:2.303.3.1637698110-1.el7
  • H
Incorrect Default Permissions

<0:2.303.3.1637698110-1.el7
  • H
Directory Traversal

<0:2.303.3.1637698110-1.el7
  • H
Improper Preservation of Permissions

<0:2.303.3.1637698110-1.el7
  • L
Improper Input Validation

*
  • H
Incorrect Default Permissions

<0:2.303.3.1637698110-1.el7
  • H
Improper Preservation of Permissions

<0:2.277.3.1623846768-1.el7
  • H
Improper Preservation of Permissions

<0:2.289.1.1624365627-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.289.1.1624365627-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.277.3.1623846768-1.el7
  • H
Directory Traversal

<0:2.263.3.1612434332-1.el7
  • M
Directory Traversal

*
  • H
Improper Input Validation

<0:2.263.3.1612434332-1.el7
  • H
Improper Input Validation

<0:2.263.3.1612433584-1.el7
  • M
Improper Check for Dropped Privileges

*
  • M
Incorrect Authorization

*
  • H
Link Following

<0:2.303.3.1637698110-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434332-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612433584-1.el7
  • H
Incorrect Authorization

<0:2.263.3.1612433584-1.el7
  • H
Incorrect Authorization

<0:2.263.3.1612434332-1.el7
  • H
XML External Entity (XXE) Injection

<0:2.289.1.1624365627-1.el7
  • H
XML External Entity (XXE) Injection

<0:2.277.3.1623846768-1.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.263.3.1612433584-1.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.263.3.1612434332-1.el7
  • H
Improper Input Validation

<0:2.263.3.1612433584-1.el7
  • H
Improper Input Validation

<0:2.263.3.1612434332-1.el7
  • H
Improper Preservation of Permissions

<0:2.277.3.1623846768-1.el7
  • H
Improper Preservation of Permissions

<0:2.289.1.1624365627-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612433584-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434332-1.el7
  • H
Deserialization of Untrusted Data

<0:2.263.3.1612433584-1.el7
  • H
Deserialization of Untrusted Data

<0:2.263.3.1612434332-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434332-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612433584-1.el7
  • H
Link Following

<0:2.263.3.1612433584-1.el7
  • H
Link Following

<0:2.263.3.1612434332-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612434332-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.263.3.1612433584-1.el7
  • H
Missing Authorization

<0:2.263.3.1612433584-1.el7
  • H
Missing Authorization

<0:2.263.3.1612433584-1.el7
  • H
Information Exposure

<0:2.263.3.1612433584-1.el7
  • H
Missing Authorization

<0:2.263.3.1612433584-1.el7
  • H
Covert Timing Channel

<0:2.263.3.1612433584-1.el7
  • H
Resource Exhaustion

<0:2.235.2.1597220898-1.el7
  • H
Static Code Injection

<0:2.150.2.1549032159-1.el7
  • H
Insufficiently Protected Credentials

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.150.2.1549032159-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.150.2.1549032159-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.150.2.1549032159-1.el7
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<0:2.176.3.1568229898-1.el7
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<0:2.176.3.1569349414-1.el7
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<0:2.176.3.1568229898-1.el7
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<0:2.176.3.1569349414-1.el7
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Information Exposure

<0:2.176.2.1563460897-1.el7
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Information Exposure

<0:2.176.2.1563461785-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.176.2.1563461785-1.el7
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

<0:2.176.2.1563460897-1.el7
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • H
Directory Traversal

<0:2.176.2.1563461785-1.el7
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Directory Traversal

<0:2.176.2.1563460897-1.el7
  • M
Directory Traversal

*
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415953-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600414805-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415953-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600414805-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415953-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600414805-1.el7
  • M
Integer Overflow or Wraparound

*
  • H
API Abuse

<0:2.204.2.1580891656-1.el7
  • H
API Abuse

<0:2.204.2.1583446818-1.el7
  • H
Information Exposure

<0:2.204.2.1583446818-1.el7
  • H
Information Exposure

<0:2.204.2.1580891656-1.el7
  • H
Information Exposure

<0:2.204.2.1580891656-1.el7
  • H
Information Exposure

<0:2.204.2.1583446818-1.el7
  • H
Covert Timing Channel

<0:2.204.2.1580891656-1.el7
  • H
Covert Timing Channel

<0:2.204.2.1583446818-1.el7
  • H
Covert Timing Channel

<0:2.204.2.1583446818-1.el7
  • H
Covert Timing Channel

<0:2.204.2.1580891656-1.el7
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:2.204.2.1580891656-1.el7
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:2.204.2.1583446818-1.el7
  • H
Authentication Bypass by Primary Weakness

<0:2.204.2.1580891656-1.el7
  • H
Authentication Bypass by Primary Weakness

<0:2.204.2.1583446818-1.el7
  • H
OS Command Injection

<0:2.204.1.1581951349-1.el7
  • H
OS Command Injection

<0:2.204.2.1583849753-1.el7
  • H
OS Command Injection

<0:2.204.1.1581950993-1.el7
  • M
Incorrect Authorization

*
  • H
Resource Exhaustion

<0:2.235.5.1600415514-1.el7
  • H
Resource Exhaustion

<0:2.235.2.1597312414-1.el7
  • H
Incomplete Blacklist

<0:2.164.2.1555422716-1.el7
  • H
Insufficiently Protected Credentials

<0:2.164.2.1555422716-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312414-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312065-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312414-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312065-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312414-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312065-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312414-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.5.1600415514-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597312065-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.235.2.1597220898-1.el7
  • H
XML External Entity (XXE) Injection

<0:2.263.3.1612433584-1.el7
  • H
XML External Entity (XXE) Injection

<0:2.263.3.1612433584-1.el7
  • M
Cross-site Scripting (XSS)

<0:2.204.1.1578490170-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:2.176.4.1578402941-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.204.1.1578490170-1.el7
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.176.4.1578402941-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:2.204.1.1578490170-1.el7
  • M
Cross-site Scripting (XSS)

<0:2.176.4.1578402941-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:2.204.1.1578490170-1.el7
  • M
Cross-site Scripting (XSS)

<0:2.176.4.1578402941-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:2.204.1.1578490170-1.el7
  • M
Cross-site Scripting (XSS)

<0:2.176.4.1578402941-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:2.176.4.1578402941-1.el7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:2.204.1.1578490170-1.el7
  • M
Insufficient Resource Pool

*
  • M
Insufficient Resource Pool

*
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591349991-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591351066-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591351669-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591351669-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591351066-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591349991-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591349991-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591351669-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.222.1.1591351066-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.222.1.1591351066-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.222.1.1591351669-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.222.1.1591349991-1.el7
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:2.319.3.1650348949-1.el7
  • H
Operation on a Resource after Expiration or Release

<0:2.235.5.1600415514-1.el7
  • H
Operation on a Resource after Expiration or Release

<0:2.235.5.1600415953-1.el7
  • H
Operation on a Resource after Expiration or Release

<0:2.235.5.1600414805-1.el7
  • M
Use of Insufficiently Random Values

<0:2.204.1.1578490170-1.el7
  • H
Out-of-bounds Read

<0:2.150.2.1549032159-1.el7
  • H
Resource Exhaustion

<0:2.150.2.1549032159-1.el7
  • H
Out-of-bounds Read

<0:2.150.2.1549032159-1.el7
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • H
Heap-based Buffer Overflow

<0:2.204.1.1581950993-1.el7
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • H
Insecure Temporary File

<0:2.263.3.1612434332-1.el7
  • H
Insecure Temporary File

<0:2.263.3.1612433584-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.204.2.1580891656-1.el7
  • L
Insufficient Session Expiration

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • L
Incorrect Default Permissions

*
  • L
Incorrect Default Permissions

*
  • H
Resource Exhaustion

<0:2.277.3.1623846768-1.el7
  • H
Resource Exhaustion

<0:2.289.1.1624365627-1.el7
  • H
Sensitive Information Uncleared Before Release

<0:2.277.3.1623846768-1.el7
  • H
Sensitive Information Uncleared Before Release

<0:2.289.1.1624365627-1.el7
  • H
Insecure Temporary File

<0:2.277.3.1623846768-1.el7
  • H
Insecure Temporary File

<0:2.289.1.1624365627-1.el7
  • H
Insecure Temporary File

<0:2.263.3.1612434332-1.el7
  • H
Insecure Temporary File

<0:2.263.3.1612433584-1.el7