jenkins-2-plugins vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jenkins-2-plugins package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2023-40339

*
  • M
Information Exposure

*
  • M
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Open Redirect

*
  • H
Session Fixation

*
  • M
Improper Certificate Validation

*
  • M
Missing Authorization

*
  • H
Cross-site Scripting (XSS)

*
  • M
CVE-2023-32261

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
CVE-2023-32262

*
  • M
Missing Authorization

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Files or Directories Accessible to External Parties

*
  • H
Out-of-bounds Write

<0:4.10.1685679861-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.10.1685679861-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.10.1685679861-1.el8
  • H
Incorrect Privilege Assignment

<0:4.10.1685679861-1.el8
  • H
Uncontrolled Recursion

<0:4.10.1684982411-1.el8
  • M
Resource Exhaustion

*
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

<0:4.8.1624022417-1.el8
  • M
Directory Traversal

<0:4.7.1616671397-1.el8
  • C
Incorrect Privilege Assignment

<0:4.10.1680703106-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.10.1680703106-1.el8
  • C
Directory Traversal

<0:4.10.1675144701-1.el8
  • C
Directory Traversal

<0:4.9.1675668922-1.el8
  • C
Directory Traversal

<0:4.9.1675668922-1.el8
  • C
Information Exposure

<0:4.10.1680703106-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.10.1675144701-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.9.1675668922-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.9.1675668922-1.el8
  • C
Reversible One-Way Hash

<0:4.9.1675668922-1.el8
  • C
Reversible One-Way Hash

<0:4.9.1675668922-1.el8
  • C
Reversible One-Way Hash

<0:4.10.1675144701-1.el8
  • C
Creation of Temporary File With Insecure Permissions

<0:4.10.1680703106-1.el8
  • M
Cross-site Scripting (XSS)

<0:4.10.1681719745-1.el8
  • M
Cross-site Scripting (XSS)

<0:4.10.1681719745-1.el8
  • C
Improper Input Validation

<0:4.10.1680703106-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.10.1675144701-1.el8
  • M
Information Exposure

*
  • C
Inappropriate Encoding for Output Context

<0:4.9.1675668922-1.el8
  • C
Inappropriate Encoding for Output Context

<0:4.10.1675144701-1.el8
  • C
Inappropriate Encoding for Output Context

<0:4.9.1675668922-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.9.1675668922-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.9.1675668922-1.el8
  • C
Cross-site Scripting (XSS)

<0:4.10.1675144701-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.10.1675144701-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.10.1675144701-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.10.1675144701-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.10.1675144701-1.el8
  • C
Inappropriate Encoding for Output Context

<0:4.9.1675668922-1.el8
  • C
Inappropriate Encoding for Output Context

<0:4.10.1675144701-1.el8
  • C
Inappropriate Encoding for Output Context

<0:4.9.1675668922-1.el8
  • M
Insufficiently Protected Credentials

*
  • H
Information Exposure

<0:4.10.1675407676-1.el8
  • C
Information Exposure

<0:4.9.1675668922-1.el8
  • H
Information Exposure

<0:4.8.1672842762-1.el8
  • C
Protection Mechanism Failure

<0:4.10.1675144701-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • C
Protection Mechanism Failure

<0:4.9.1675668922-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.8.1672842762-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:4.9.1675668922-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:4.10.1675144701-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • C
Missing Authorization

<0:4.10.1675144701-1.el8
  • M
Missing Authorization

*
  • H
Missing Authorization

<0:4.8.1672842762-1.el8
  • C
Missing Authorization

<0:4.9.1675668922-1.el8
  • C
Missing Authorization

<0:4.10.1675144701-1.el8
  • C
Missing Authorization

<0:4.9.1675668922-1.el8
  • M
Missing Authorization

*
  • H
Missing Authorization

<0:4.8.1672842762-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.8.1672842762-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:4.10.1675144701-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:4.9.1675668922-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • H
Directory Traversal

<0:4.8.1672842762-1.el8
  • H
Directory Traversal

<0:4.9.1669894222-1.el8
  • H
Directory Traversal

<0:4.10.1663147786-1.el8
  • H
Information Exposure

<0:4.8.1672842762-1.el8
  • C
Information Exposure

<0:4.10.1675144701-1.el8
  • C
Information Exposure

<0:4.9.1675668922-1.el8
  • M
Information Exposure

*
  • H
Information Exposure

<0:4.8.1672842762-1.el8
  • C
Information Exposure

<0:4.10.1675144701-1.el8
  • M
Information Exposure

*
  • C
Information Exposure

<0:4.9.1675668922-1.el8
  • H
Key Exchange without Entity Authentication

<0:4.8.1672842762-1.el8
  • H
Key Exchange without Entity Authentication

<0:4.10.1667388055-1.el8
  • H
Key Exchange without Entity Authentication

<0:4.9.1667460322-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.10.1663147786-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.8.1672842762-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.9.1667460322-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.8.1646993358-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.6.1653312933-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.7.1652967082-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.9.1651754460-1.el8
  • M
Cross-site Scripting (XSS)

<0:4.10.1650890594-1.el8
  • H
Interaction Error

*
  • H
Interaction Error

<0:4.8.1672842762-1.el8
  • C
Files or Directories Accessible to External Parties

<0:4.10.1675144701-1.el8
  • H
Files or Directories Accessible to External Parties

<0:4.8.1672842762-1.el8
  • C
Files or Directories Accessible to External Parties

<0:4.9.1675668922-1.el8
  • M
Files or Directories Accessible to External Parties

*
  • M
Cross-site Scripting (XSS)

<0:4.10.1650890594-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.9.1651754460-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.9.1651754460-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • H
Cross-site Request Forgery (CSRF)

<0:4.8.1672842762-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:4.10.1675144701-1.el8
  • C
Cross-site Request Forgery (CSRF)

<0:4.9.1675668922-1.el8
  • H
Files or Directories Accessible to External Parties

*
  • H
Files or Directories Accessible to External Parties

<0:4.8.1672842762-1.el8
  • L
Cross-site Scripting (XSS)

*
  • H
Link Following

<0:4.9.1647580879-1.el8
  • H
Link Following

<0:4.8.1646993358-1.el8
  • H
Link Following

<0:4.10.1647505461-1.el8
  • H
Link Following

<0:4.6.1650364520-1.el8
  • H
Link Following

<0:4.7.1648800585-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Incorrect Default Permissions

<0:4.10.1650890594-1.el8
  • H
Authentication Bypass

<0:4.9.1651754460-1.el8
  • H
Authentication Bypass

<0:4.7.1652967082-1.el8
  • H
Authentication Bypass

<0:4.8.1672842762-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.7.1648800585-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.10.1647505461-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.9.1647580879-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.6.1650364520-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.8.1646993358-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.9.1647580879-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.6.1650364520-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.10.1647505461-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.8.1646993358-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.7.1648800585-1.el8
  • C
Server-Side Request Forgery (SSRF)

<0:4.10.1680703106-1.el8
  • L
Race Condition

*
  • H
Link Following

<0:4.8.1646993358-1.el8
  • H
Link Following

<0:4.6.1650364520-1.el8
  • H
Link Following

<0:4.9.1647580879-1.el8
  • H
Link Following

<0:4.7.1648800585-1.el8
  • H
Link Following

<0:4.10.1647505461-1.el8
  • H
Link Following

<0:4.7.1648800585-1.el8
  • H
Link Following

<0:4.8.1646993358-1.el8
  • H
Link Following

<0:4.6.1650364520-1.el8
  • H
Link Following

<0:4.10.1647505461-1.el8
  • H
Link Following

<0:4.9.1647580879-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.8.1646993358-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.9.1647580879-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.10.1647505461-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.6.1650364520-1.el8
  • H
Incorrect Behavior Order: Early Validation

<0:4.7.1648800585-1.el8
  • H
OS Command Injection

<0:4.6.1650364520-1.el8
  • H
OS Command Injection

<0:4.7.1648800585-1.el8
  • H
OS Command Injection

<0:4.8.1646993358-1.el8
  • H
OS Command Injection

<0:4.10.1647505461-1.el8
  • H
OS Command Injection

<0:4.9.1647580879-1.el8
  • H
Information Exposure

<0:4.9.1647580879-1.el8
  • H
Information Exposure

<0:4.10.1647505461-1.el8
  • H
Information Exposure

<0:4.6.1650364520-1.el8
  • H
Information Exposure

<0:4.8.1646993358-1.el8
  • H
Information Exposure

<0:4.7.1648800585-1.el8
  • H
Insufficiently Protected Credentials

<0:4.6.1650364520-1.el8
  • H
Insufficiently Protected Credentials

<0:4.10.1647505461-1.el8
  • H
Insufficiently Protected Credentials

<0:4.8.1646993358-1.el8
  • H
Insufficiently Protected Credentials

<0:4.7.1648800585-1.el8
  • H
Insufficiently Protected Credentials

<0:4.9.1647580879-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

<0:4.10.1650890594-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.6.1653312933-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.7.1652967082-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.8.1646993358-1.el8
  • H
Cross-site Scripting (XSS)

<0:4.9.1651754460-1.el8
  • M
Missing Authorization

*
  • H
Link Following

<0:4.9.1647580879-1.el8
  • H
Link Following

<0:4.7.1648800585-1.el8
  • H
Link Following

<0:4.6.1650364520-1.el8
  • H
Link Following

<0:4.10.1647505461-1.el8
  • H
Link Following

<0:4.8.1646993358-1.el8
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Insufficiently Protected Credentials

*
  • H
OS Command Injection

<0:4.9.1647580879-1.el8
  • H
OS Command Injection

<0:4.8.1646993358-1.el8
  • H
OS Command Injection

<0:4.7.1648800585-1.el8
  • H
OS Command Injection

<0:4.10.1647505461-1.el8
  • H
OS Command Injection

<0:4.6.1650364520-1.el8
  • H
OS Command Injection

<0:4.10.1647505461-1.el8
  • H
OS Command Injection

<0:4.8.1646993358-1.el8
  • H
OS Command Injection

<0:4.6.1650364520-1.el8
  • H
OS Command Injection

<0:4.7.1648800585-1.el8
  • H
OS Command Injection

<0:4.9.1647580879-1.el8
  • H
OS Command Injection

<0:4.7.1643883495-1.el8
  • H
OS Command Injection

<0:4.9.1643389956-1.el8
  • H
OS Command Injection

<0:4.8.1643649345-1.el8
  • H
OS Command Injection

<0:4.6.1643965689-1.el8
  • M
Incorrect Permission Assignment for Critical Resource

<0:4.10.1643404185-1.el8
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Missing Authorization

*
  • M
Deserialization of Untrusted Data

*
  • H
Arbitrary Code Injection

<0:4.8.1646993358-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.6.1643965689-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.8.1643649345-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.9.1643389956-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.7.1643883495-1.el8
  • M
Improper Input Validation

<0:4.8.1624022417-1.el8
  • M
Improper Validation of Array Index

<0:4.8.1624022417-1.el8
  • M
Improper Validation of Array Index

<0:4.7.1616671397-1.el8
  • M
Improper Certificate Validation

<0:4.8.1624022417-1.el8
  • H
Directory Traversal

<0:4.7.1637600997-1.el8
  • H
Directory Traversal

<0:4.6.1637602169-1.el8
  • H
Directory Traversal

<0:4.9.1637598812-1.el8
  • H
Directory Traversal

<0:4.8.1637599935-1.el8
  • H
Directory Traversal

<0:4.8.1637599935-1.el8
  • H
Directory Traversal

<0:4.7.1637600997-1.el8
  • H
Directory Traversal

<0:4.9.1637598812-1.el8
  • H
Directory Traversal

<0:4.6.1637602169-1.el8
  • H
Directory Traversal

<0:4.9.1637598812-1.el8
  • H
Directory Traversal

<0:4.7.1637600997-1.el8
  • H
Directory Traversal

<0:4.6.1637602169-1.el8
  • H
Directory Traversal

<0:4.8.1637599935-1.el8
  • M
Information Exposure

*
  • M
Improper Input Validation

<0:4.8.1624022417-1.el8
  • H
Improper Verification of Cryptographic Signature

*
  • H
Incorrect Default Permissions

<0:4.8.1637599935-1.el8
  • H
Incorrect Default Permissions

<0:4.6.1637602169-1.el8
  • H
Incorrect Default Permissions

<0:4.7.1637600997-1.el8
  • H
Incorrect Default Permissions

<0:4.9.1637598812-1.el8
  • H
Link Following

<0:4.7.1637600997-1.el8
  • H
Link Following

<0:4.6.1637602169-1.el8
  • H
Link Following

<0:4.8.1637599935-1.el8
  • H
Link Following

<0:4.9.1637598812-1.el8
  • H
Incorrect Default Permissions

<0:4.9.1637598812-1.el8
  • H
Incorrect Default Permissions

<0:4.7.1637600997-1.el8
  • H
Incorrect Default Permissions

<0:4.8.1637599935-1.el8
  • H
Incorrect Default Permissions

<0:4.6.1637602169-1.el8
  • H
Link Following

<0:4.7.1637600997-1.el8
  • H
Link Following

<0:4.8.1637599935-1.el8
  • H
Link Following

<0:4.9.1637598812-1.el8
  • H
Link Following

<0:4.6.1637602169-1.el8
  • H
Directory Traversal

<0:4.7.1637600997-1.el8
  • H
Directory Traversal

<0:4.8.1637599935-1.el8
  • H
Directory Traversal

<0:4.9.1637598812-1.el8
  • H
Directory Traversal

<0:4.6.1637602169-1.el8
  • H
Incorrect Authorization

<0:4.8.1637599935-1.el8
  • H
Incorrect Authorization

<0:4.9.1637598812-1.el8
  • H
Incorrect Authorization

<0:4.6.1637602169-1.el8
  • H
Incorrect Authorization

<0:4.7.1637600997-1.el8
  • H
Incorrect Default Permissions

<0:4.9.1637598812-1.el8
  • H
Incorrect Default Permissions

<0:4.8.1637599935-1.el8
  • H
Incorrect Default Permissions

<0:4.6.1637602169-1.el8
  • H
Incorrect Default Permissions

<0:4.7.1637600997-1.el8
  • H
Directory Traversal

<0:4.8.1637599935-1.el8
  • H
Directory Traversal

<0:4.7.1637600997-1.el8
  • H
Directory Traversal

<0:4.9.1637598812-1.el8
  • H
Directory Traversal

<0:4.6.1637602169-1.el8
  • M
Cross-site Scripting (XSS)

<0:4.10.1643404185-1.el8
  • H
Improper Preservation of Permissions

<0:4.6.1637602169-1.el8
  • H
Improper Preservation of Permissions

<0:4.9.1637598812-1.el8
  • H
Improper Preservation of Permissions

<0:4.7.1637600997-1.el8
  • H
Improper Preservation of Permissions

<0:4.8.1637599935-1.el8
  • M
Improper Input Validation

<0:4.8.1624022417-1.el8
  • H
Incorrect Default Permissions

<0:4.7.1637600997-1.el8
  • H
Incorrect Default Permissions

<0:4.9.1637598812-1.el8
  • H
Incorrect Default Permissions

<0:4.8.1637599935-1.el8
  • H
Incorrect Default Permissions

<0:4.6.1637602169-1.el8
  • H
Improper Preservation of Permissions

<0:4.6.1623162648-1.el8
  • H
Improper Preservation of Permissions

<0:4.7.1621361158-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.7.1621361158-1.el8
  • H
Cross-site Request Forgery (CSRF)

<0:4.6.1623162648-1.el8
  • M
Improper Check for Dropped Privileges

<0:4.8.1624022417-1.el8
  • H
Link Following

<0:4.9.1637598812-1.el8
  • H
Link Following

<0:4.6.1637602169-1.el8
  • H
Link Following

<0:4.8.1637599935-1.el8
  • H
Link Following

<0:4.7.1637600997-1.el8
  • M
Cross-site Scripting (XSS)

<0:4.8.1624022417-1.el8
  • H
XML External Entity (XXE) Injection

<0:4.6.1623162648-1.el8
  • H
XML External Entity (XXE) Injection

<0:4.7.1621361158-1.el8
  • H
Improper Preservation of Permissions

<0:4.6.1623162648-1.el8
  • H
Improper Preservation of Permissions

<0:4.7.1621361158-1.el8
  • H
Missing Authorization

<0:4.6.1609853716-1.el8
  • M
Improper Output Neutralization for Logs

<0:4.6.1601368321-1.el8
  • M
Improper Validation of Certificate with Host Mismatch

<0:4.6.1601368321-1.el8
  • C
Improper Authorization

<0:4.10.1675144701-1.el8
  • C
Improper Authorization

<0:4.9.1675668922-1.el8
  • C
Improper Authorization

<0:4.9.1675668922-1.el8
  • H
Missing Authorization

<0:4.6.1609853716-1.el8
  • H
Information Exposure

<0:4.6.1609853716-1.el8
  • H
Missing Authorization

<0:4.6.1609853716-1.el8
  • M
Missing Authorization

<0:4.6.1601368321-1.el8
  • M
Directory Traversal

<0:4.6.1601368321-1.el8
  • M
Static Code Injection

*
  • M
Insufficiently Protected Credentials

<0:4.6.1601368321-1.el8
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

<0:4.8.1624022417-1.el8
  • M
Cross-site Scripting (XSS)

*
  • M
Insufficiently Protected Credentials

*
  • M
Cross-site Request Forgery (CSRF)

*
  • C
Deserialization of Untrusted Data

<0:4.10.1675144701-1.el8
  • C
Deserialization of Untrusted Data

<0:4.9.1675668922-1.el8
  • C
Deserialization of Untrusted Data

<0:4.9.1675668922-1.el8
  • M
Improper Access Control

*
  • H
Improper Input Validation

*
  • H
Incorrect Type Conversion or Cast

*
  • M
Deserialization of Untrusted Data

*
  • M
CVE-2022-33980

*
  • M
Cross-site Scripting (XSS)

*
  • H
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • C
Arbitrary Code Injection

*
  • C
Arbitrary Code Injection

<0:4.10.1680703106-1.el8
  • C
Arbitrary Code Injection

<0:4.9.1680069756-1.el8
  • M
XML External Entity (XXE) Injection

*
  • M
Insufficiently Protected Credentials

*
  • H
XML External Entity (XXE) Injection

<0:4.6.1609853716-1.el8
  • H
XML External Entity (XXE) Injection

<0:4.6.1609853716-1.el8
  • C
Insufficient Resource Pool

<0:4.9.1675668922-1.el8
  • H
Insufficient Resource Pool

<0:4.8.1672842762-1.el8
  • M
Cross-site Scripting (XSS)

*
  • H
Arbitrary Code Injection

*
  • H
Incorrect Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Arbitrary Code Injection

*
  • C
Improper Privilege Management

<0:4.10.1680703106-1.el8
  • H
Improper Neutralization

<0:4.10.1685679861-1.el8
  • H
Buffer Overflow

<0:4.10.1685679861-1.el8
  • C
HTTP Request Smuggling

<0:4.10.1680703106-1.el8
  • M
Improper Input Validation

*
  • C
Incorrect Authorization

<0:4.10.1680703106-1.el8
  • M
Improper Certificate Validation

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • H
Improper Input Validation

<0:4.10.1675407676-1.el8
  • C
Improper Input Validation

<0:4.9.1675668922-1.el8
  • C
Improper Input Validation

<0:4.9.1675668922-1.el8
  • M
Stack-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Out-of-bounds Write

*
  • C
Resource Exhaustion

<0:4.9.1675668922-1.el8
  • C
Resource Exhaustion

<0:4.10.1675144701-1.el8
  • C
Resource Exhaustion

<0:4.9.1675668922-1.el8
  • H
Resource Exhaustion

<0:4.6.1653312933-1.el8
  • H
Arbitrary Command Injection

*
  • H
Arbitrary Command Injection

<0:4.9.1674644684-1.el8
  • H
Arbitrary Command Injection

<0:4.10.1670851835-1.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.9.1647580879-1.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.9.1647580879-1.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.1650364520-1.el8
  • M
Information Exposure

<0:4.10.1643404185-1.el8
  • M
Resource Exhaustion

<0:4.10.1643404185-1.el8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.10.1643404185-1.el8
  • M
Improper Input Validation

<0:4.10.1643404185-1.el8
  • H
Incorrect Default Permissions

<0:4.8.1637599935-1.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.6.1601368321-1.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.1601368321-1.el8
  • M
Improper Validation of Certificate with Host Mismatch

<0:4.10.1643404185-1.el8
  • M
Incorrect Calculation

<0:4.7.1616671397-1.el8
  • M
Incorrect Calculation

<0:4.8.1624022417-1.el8
  • H
Improper Certificate Validation

<0:4.6.1609853716-1.el8
  • H
Race Condition

<0:4.7.1621361158-1.el8
  • M
Race Condition

<0:4.6.1601368321-1.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.7.1621361158-1.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.1601368321-1.el8
  • M
Information Exposure

*