Severity Critical High Medium Low Informational Vulnerability Categories Abuse Of Functionality Acumonitor Api Bfla Api Bola Api Broken Auth Api Broken Object Prop Auth Api Dos Api Improper Inventory Management Api Misconfiguration Api Ssrf Arbitrary File Creation Arbitrary File Read Arbitrary File Write Authentication Bypass BOLA Bruteforce Possible Buffer Overflow CSRF CSTI Code Execution Configuration Crlf Injection Deepscan Default Credentials Denial-of-service Dev Files Directory Listing Directory Traversal Eli Injection Error Handling File Inclusion Http Parameter Pollution Http Response Splitting Information Disclosure Insecure Admin Access Insecure Deserialization Internal Ip Disclosure Known Vulnerabilitie Known Vulnerabilities LLM Ldap Injection Llm Excessive Agency Llm Insecure Output Handling Llm Prompt Injection Llm Sensitive Information Disclosure Malware Missing Update Path Traversal Privilege Escalation Remote Code Execution SSRF SSTI Sensitive Data Not Over Ssl Server Side Template Injection Session Fixation Source Code Disclosure Sql Injection Test Files Unauthenticated File Upload Url Redirection Weak Credentials Weak Crypto XFS XSS XXE Xpath Injection Vulnerability Name CVE CWE CWE Severity Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14384) CVE-2020-14384 CWE-400 CWE-400 High Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25644) CVE-2020-25644 CWE-400 CWE-400 High Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25689) CVE-2020-25689 CWE-400 CWE-400 Medium Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3629) CVE-2021-3629 CWE-400 CWE-400 High Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3690) CVE-2021-3690 CWE-400 CWE-400 High Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487) CVE-2023-44487 CWE-400 CWE-400 High Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2024-1635) CVE-2024-1635 CWE-400 CWE-400 High Jboss EAP Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12617) CVE-2017-12617 CWE-434 CWE-434 High Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2011-2487) CVE-2011-2487 CWE-327 CWE-327 Medium Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180) CVE-2018-1000180 CWE-327 CWE-327 High Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2017-7536) CVE-2017-7536 CWE-470 CWE-470 High Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2019-10174) CVE-2019-10174 CWE-470 CWE-470 High Jboss EAP XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2018-1000632) CVE-2018-1000632 CWE-91 CWE-91 High JBoss HttpAdaptor JMXInvokerServlet CWE-94 CWE-94 High JBoss InvokerTransformer Remote Code Execution CVE-2015-7501 CWE-502 CWE-502 High JBoss JMX Console Unrestricted Access CWE-200 CWE-200 High JBoss JMX management console CWE-200 CWE-200 High JBoss Seam framework remote code execution CVE-2010-1871 CWE-94 CWE-94 High JBoss Seam remoting vulnerabilities CVE-2013-6447 CVE-2013-6448 CWE-611 CWE-611 High JBoss ServerInfo MBean CVE-2010-0738 CWE-200 CWE-200 High JBoss Server MBean CWE-200 CWE-200 High JBoss status servlet information leak CVE-2010-1429 CWE-200 CWE-200 Medium JBoss Web Console JMX Invoker CWE-200 CWE-200 High JBoss web service console CWE-200 CWE-200 Low Jenkins 7PK - Security Features Vulnerability (CVE-2014-9634) CVE-2014-9634 Medium Jenkins 7PK - Security Features Vulnerability (CVE-2014-9635) CVE-2014-9635 Medium Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2021-21607) CVE-2021-21607 CWE-770 CWE-770 Medium Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27900) CVE-2023-27900 CWE-770 CWE-770 High Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27901) CVE-2023-27901 CWE-770 CWE-770 High Jenkins Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2017-1000503) CVE-2017-1000503 CWE-362 CWE-362 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-0327) CVE-2013-0327 CWE-352 CWE-352 Medium Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-0328) CVE-2013-0328 CWE-352 CWE-352 Medium Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5318) CVE-2015-5318 CWE-352 CWE-352 Medium Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537) CVE-2015-7537 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-2613) CVE-2017-2613 CWE-352 CWE-352 Medium Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000356) CVE-2017-1000356 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000504) CVE-2017-1000504 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-1000195) CVE-2018-1000195 CWE-352 CWE-352 Medium Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10353) CVE-2019-10353 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10384) CVE-2019-10384 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-2160) CVE-2020-2160 CWE-352 CWE-352 High Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-20612) CVE-2022-20612 CWE-352 CWE-352 Medium Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-35141) CVE-2023-35141 CWE-352 CWE-352 High Jenkins Cryptographic Issues Vulnerability (CVE-2014-2061) CVE-2014-2061 Medium Jenkins CVE-2013-0158 Vulnerability (CVE-2013-0158) CVE-2013-0158 Low Jenkins CVE-2013-0329 Vulnerability (CVE-2013-0329) CVE-2013-0329 High Jenkins CVE-2013-0330 Vulnerability (CVE-2013-0330) CVE-2013-0330 Medium Jenkins CVE-2014-2060 Vulnerability (CVE-2014-2060) CVE-2014-2060 Medium Jenkins CVE-2014-2063 Vulnerability (CVE-2014-2063) CVE-2014-2063 High Jenkins CVE-2015-7538 Vulnerability (CVE-2015-7538) CVE-2015-7538 High Jenkins CVE-2017-2602 Vulnerability (CVE-2017-2602) CVE-2017-2602 Medium Jenkins CVE-2018-1000408 Vulnerability (CVE-2018-1000408) CVE-2018-1000408 Medium Jenkins CVE-2021-21682 Vulnerability (CVE-2021-21682) CVE-2021-21682 Medium Jenkins CVE-2023-27902 Vulnerability (CVE-2023-27902) CVE-2023-27902 Medium Jenkins CVE-2023-27904 Vulnerability (CVE-2023-27904) CVE-2023-27904 Medium Jenkins CVE-2023-43494 Vulnerability (CVE-2023-43494) CVE-2023-43494 Medium Jenkins CVE-2023-43498 Vulnerability (CVE-2023-43498) CVE-2023-43498 High Jenkins CVE-2023-44487 Vulnerability (CVE-2023-44487) CVE-2023-44487 High Jenkins CVE-2024-47804 Vulnerability (CVE-2024-47804) CVE-2024-47804 Medium Jenkins dashboard CWE-200 CWE-200 Medium Jenkins DEPRECATED: Code Vulnerability (CVE-2016-3721) CVE-2016-3721 Medium Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2015-8103) CVE-2015-8103 CWE-502 CWE-502 Critical Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-2608) CVE-2017-2608 CWE-502 CWE-502 High Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-1000353) CVE-2017-1000353 CWE-502 CWE-502 Critical Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-1000355) CVE-2017-1000355 CWE-502 CWE-502 Medium Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2018-1000861) CVE-2018-1000861 CWE-502 CWE-502 Critical Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2018-1999042) CVE-2018-1999042 CWE-502 CWE-502 Medium Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2021-21604) CVE-2021-21604 CWE-502 CWE-502 High Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2022-0538) CVE-2022-0538 CWE-502 CWE-502 High Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-2064) CVE-2014-2064 CWE-200 CWE-200 Medium Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3662) CVE-2014-3662 CWE-200 CWE-200 Medium Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3667) CVE-2014-3667 CWE-200 CWE-200 Medium Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3680) CVE-2014-3680 CWE-200 CWE-200 Medium Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5317) CVE-2015-5317 CWE-200 CWE-200 Medium Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5320) CVE-2015-5320 CWE-200 CWE-200 Medium 1...49505152...308 50 / 308