jenkins vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jenkins package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Integer Overflow or Wraparound

*
  • H
Creation of Temporary File With Insecure Permissions

*
  • M
Cross-site Scripting (XSS)

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
Permissive Regular Expression

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Incomplete Cleanup

*
  • H
Cross-site Scripting (XSS)

*
  • M
Files or Directories Accessible to External Parties

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • M
Incorrect Privilege Assignment

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Resource Shutdown or Release

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Missing Authorization

*
  • M
Cross-site Request Forgery (CSRF)

*
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • L
Improper Input Validation

*
  • H
Incorrect Default Permissions

*
  • H
Link Following

*
  • M
Session Fixation

*
  • H
Incorrect Default Permissions

*
  • M
Improper Preservation of Permissions

*
  • H
Link Following

*
  • H
Directory Traversal

*
  • H
Incorrect Authorization

*
  • H
Incorrect Default Permissions

*
  • H
Directory Traversal

*
  • H
Improper Preservation of Permissions

*
  • L
Improper Input Validation

*
  • H
Incorrect Default Permissions

*
  • M
Directory Traversal

*
  • H
Improper Input Validation

*
  • M
Improper Check for Dropped Privileges

*
  • M
Incorrect Authorization

*
  • H
Link Following

*
  • H
Cross-site Scripting (XSS)

*
  • L
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Input Validation

*
  • H
Cross-site Scripting (XSS)

*
  • H
Deserialization of Untrusted Data

*
  • H
Cross-site Scripting (XSS)

*
  • M
Link Following

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Directory Traversal

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
API Abuse

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Covert Timing Channel

*
  • M
Covert Timing Channel

*
  • M
Insufficient Control of Network Message Volume (Network Amplification)

*
  • H
Authentication Bypass by Primary Weakness

*
  • M
Incorrect Authorization

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Insufficient Resource Pool

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Request Forgery (CSRF)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Resource Exhaustion

*
  • H
Operation on a Resource after Expiration or Release

*
  • M
Information Exposure

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Validation of Certificate with Host Mismatch

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • L
Insufficient Session Expiration

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • L
Incorrect Default Permissions

*
  • M
Resource Exhaustion

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*