Jenkins Schwachstellen

Zeitverlauf

Vergangenes Jahr

Version

2.036
2.136
2.235
2.4333
2.327

Massnahmen

Official Fix129
Temporary Fix0
Workaround1
Unavailable0
Not Defined134

Ausnutzbarkeit

High4
Functional0
Proof-of-Concept5
Unproven0
Not Defined255

Zugriffsart

Not Defined0
Physical0
Local6
Adjacent41
Network217

Authentisierung

Not Defined0
High6
Low143
None115

Benutzeraktivität

Not Defined0
Required109
None155

C3BM Index

Vergangenes Jahr

CVSSv3 Base

≤10
≤20
≤31
≤413
≤587
≤687
≤741
≤826
≤96
≤103

CVSSv3 Temp

≤10
≤20
≤31
≤413
≤588
≤696
≤740
≤818
≤96
≤102

VulDB

≤10
≤20
≤34
≤456
≤563
≤670
≤739
≤825
≤94
≤103

NVD

≤10
≤20
≤31
≤42
≤536
≤659
≤735
≤821
≤929
≤107

CNA

≤10
≤20
≤31
≤43
≤57
≤64
≤72
≤80
≤91
≤100

Hersteller

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploit 0-day

<1k81
<2k131
<5k52
<10k0
<25k0
<50k0
<100k0
≥100k0

Exploit heute

<1k262
<2k2
<5k0
<10k0
<25k0
<50k0
<100k0
≥100k0

Exploitmarktvolumen

Vergangenes Jahr

🔴 CTI Aktivitäten

Affected Versions (266): 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.309, 1.399, 1.423, 1.424, 1.424.0.1, 1.424.1, 1.424.2, 1.424.3, 1.424.4, 1.466, 1.480, 1.481, 1.497, 1.509, 1.513, 1.523, 1.532.1, 1.549, 1.550, 1.585, 1.586, 1.625, 1.625.1, 1.637, 1.639, 1.649, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 2.10, 2.11, 2.12, 2.13, 2.14, 2.15, 2.16, 2.17, 2.18, 2.19, 2.20, 2.21, 2.22, 2.23, 2.24, 2.25, 2.26, 2.27, 2.28, 2.29, 2.30, 2.31, 2.32, 2.32.1, 2.33, 2.34, 2.35, 2.36, 2.37, 2.38, 2.39, 2.40, 2.41, 2.42, 2.43, 2.44, 2.45, 2.46, 2.46.1, 2.47, 2.48, 2.49, 2.50, 2.51, 2.52, 2.53, 2.54, 2.55, 2.56, 2.57, 2.58, 2.59, 2.60, 2.61, 2.62, 2.63, 2.64, 2.65, 2.66, 2.67, 2.68, 2.69, 2.70, 2.71, 2.72, 2.73, 2.73.1, 2.73.2, 2.74, 2.75, 2.76, 2.77, 2.78, 2.79, 2.80, 2.81, 2.82, 2.83, 2.84, 2.85, 2.86, 2.87, 2.88, 2.89, 2.89.1, 2.90, 2.91, 2.92, 2.93, 2.94, 2.106, 2.115, 2.120, 2.121, 2.121.1, 2.121.2, 2.132, 2.137, 2.145, 2.150.1, 2.150.2.3, 2.153, 2.158, 2.159, 2.170, 2.171, 2.185, 2.191, 2.196, 2.213, 2.218, 2.227, 2.244, 2.251, 2.274, 2.275, 2.286, 2.299, 2.314, 2.318, 2.319, 2.319.1, 2.319.2, 2.329, 2.355, 2.367, 2.368, 2.369, 2.399, 2.415, 2.423, 2.426, 2.426.1, 2.426.2, 2.441, LTE 2.107, LTE 2.107.1, LTS 1.466, LTS 1.466.1, LTS 1.651, LTS 1.651.1, LTS 2.89, LTS 2.89.1, LTS 2.89.2, LTS 2.89.3, LTS 2.107, LTS 2.107.1, LTS 2.107.2, LTS 2.138, LTS 2.138.1, LTS 2.138.2, LTS 2.138.3, LTS 2.176, LTS 2.176.1, LTS 2.176.2, LTS 2.176.3, LTS 2.204, LTS 2.204.1, LTS 2.204.2, LTS 2.204.3, LTS 2.204.4, LTS 2.204.5, LTS 2.235, LTS 2.235.1, LTS 2.235.2, LTS 2.235.3, LTS 2.263, LTS 2.263.1, LTS 2.263.2, LTS 2.277, LTS 2.277.1, LTS 2.289, LTS 2.289.1, LTS 2.303, LTS 2.303.1, LTS 2.303.2, LTS 2.319, LTS 2.319.1, LTS 2.332, LTS 2.332.1, LTS 2.332.2, LTS 2.332.3, LTS 2.333, LTS 2.387, LTS 2.387.1, LTS 2.387.2, LTS 2.387.3, LTS 2.401, LTS 2.401.1, LTS 2.401.2, LTS 2.414, LTS 2.414.1

Softwaretyp: Continuous Integration Software

VeröffentlichtBaseTempSchwachstelle0dayHeuteAusMasCTICVE
24.01.20247.57.4Jenkins Command Line Interface schwache Authentisierung$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2024-23898
24.01.20245.55.4Jenkins Command Line Interface Information Disclosure$0-$5k$0-$5kNot DefinedOfficial Fix0.10CVE-2024-23897
20.09.20237.17.1Jenkins Temporary Directory erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2023-43496
20.09.20234.44.4Jenkins Caption Parameter ExpandableDetailsNote Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2023-43495
20.09.20236.86.7Jenkins MultipartFormDataParser erweiterte Rechte$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-43498
20.09.20236.86.8Jenkins Stapler Web Framework erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2023-43497
20.09.20233.93.9Jenkins Build Variable erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-43494
26.07.20234.44.4Jenkins URL Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2023-39151
14.06.20235.55.5Jenkins POST Request erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2023-35141
11.03.20234.44.4Jenkins Version Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.10CVE-2023-27898
11.03.20236.16.1Jenkins Local Privilege Escalation$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-27899
11.03.20234.44.4Jenkins Agent Connection Information Disclosure$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2023-27904
11.03.20235.05.0Jenkins CLI erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2023-27903
11.03.20235.55.5Jenkins Job Workspace erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-27902
11.03.20235.55.5Jenkins Apache Commons FileUpload Denial of Service$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-27901
11.03.20235.55.5Jenkins Apache Commons FileUpload Denial of Service$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2023-27900
22.09.20224.44.4Jenkins Tooltip Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-41224
27.07.20224.44.4Maven Metadata Plugin for Jenkins CI Server URL Validation Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-36905
24.06.20224.44.4Maven Metadata Plugin for Jenkins CI Server List Maven Artifact Versions Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-34190
24.06.20224.84.8Jenkins Build Button Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-34173
24.06.20224.84.8Jenkins Symbol-based Icons Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-34172
24.06.20224.84.8Jenkins SVG Icon Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-34171
24.06.20224.84.8Jenkins Help Icon Cross Site Scripting$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-34170
24.06.20223.53.5Jenkins Fragment erweiterte Rechte$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2022-34175
23.06.20223.13.1Jenkins Login Form Information Disclosure$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2022-34174

239 weitere Einträge werden nicht mehr angezeigt

Do you need the next level of professionalism?

Upgrade your account now!