Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jboss EAP Improper Privilege Management Vulnerability (CVE-2019-14838)
|
CVE-2019-14838
CWE-269
|
CWE-269
|
Medium
|
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2011-4610)
|
CVE-2011-4610
CWE-119
|
CWE-119
|
Medium
|
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5220)
|
CVE-2015-5220
CWE-119
|
CWE-119
|
Medium
|
Jboss EAP Improper Validation of Integrity Check Value Vulnerability (CVE-2023-48795)
|
CVE-2023-48795
CWE-354
|
CWE-354
|
Medium
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-2666)
|
CVE-2017-2666
CWE-444
|
CWE-444
|
Medium
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-10687)
|
CVE-2020-10687
CWE-444
|
CWE-444
|
Medium
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-10719)
|
CVE-2020-10719
CWE-444
|
CWE-444
|
Medium
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2014-0169)
|
CVE-2014-0169
CWE-863
|
CWE-863
|
Medium
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2017-12196)
|
CVE-2017-12196
CWE-863
|
CWE-863
|
Medium
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2022-0866)
|
CVE-2022-0866
CWE-863
|
CWE-863
|
Medium
|
Jboss EAP Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2021-3642)
|
CVE-2021-3642
|
|
Medium
|
Jboss EAP Other Vulnerability (CVE-2020-1710)
|
CVE-2020-1710
|
|
Medium
|
Jboss EAP Other Vulnerability (CVE-2023-3628)
|
CVE-2023-3628
|
|
Medium
|
Jboss EAP Other Vulnerability (CVE-2023-3629)
|
CVE-2023-3629
|
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-0738)
|
CVE-2010-0738
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1428)
|
CVE-2010-1428
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1429)
|
CVE-2010-1429
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-1484)
|
CVE-2011-1484
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2196)
|
CVE-2011-2196
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1154)
|
CVE-2012-1154
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1167)
|
CVE-2012-1167
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3369)
|
CVE-2012-3369
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3370)
|
CVE-2012-3370
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4549)
|
CVE-2012-4549
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4550)
|
CVE-2012-4550
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5478)
|
CVE-2012-5478
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2133)
|
CVE-2013-2133
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0093)
|
CVE-2014-0093
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3464)
|
CVE-2014-3464
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3472)
|
CVE-2014-3472
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7849)
|
CVE-2014-7849
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Resource Management Errors Vulnerability (CVE-2016-7046)
|
CVE-2016-7046
|
|
Medium
|
Jboss EAP Session Fixation Vulnerability (CVE-2021-20324)
|
CVE-2021-20324
CWE-384
|
CWE-384
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2014-0118)
|
CVE-2014-0118
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8627)
|
CVE-2016-8627
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14340)
|
CVE-2020-14340
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25689)
|
CVE-2020-25689
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2011-2487)
|
CVE-2011-2487
CWE-327
|
CWE-327
|
Medium
|
JBoss status servlet information leak
|
CVE-2010-1429
CWE-200
|
CWE-200
|
Medium
|
Jenkins 7PK - Security Features Vulnerability (CVE-2014-9634)
|
CVE-2014-9634
|
|
Medium
|
Jenkins 7PK - Security Features Vulnerability (CVE-2014-9635)
|
CVE-2014-9635
|
|
Medium
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2021-21607)
|
CVE-2021-21607
CWE-770
|
CWE-770
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-0327)
|
CVE-2013-0327
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-0328)
|
CVE-2013-0328
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5318)
|
CVE-2015-5318
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-2613)
|
CVE-2017-2613
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-1000195)
|
CVE-2018-1000195
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-20612)
|
CVE-2022-20612
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cryptographic Issues Vulnerability (CVE-2014-2061)
|
CVE-2014-2061
|
|
Medium
|
Jenkins CVE-2013-0330 Vulnerability (CVE-2013-0330)
|
CVE-2013-0330
|
|
Medium
|
Jenkins CVE-2014-2060 Vulnerability (CVE-2014-2060)
|
CVE-2014-2060
|
|
Medium
|
Jenkins CVE-2017-2602 Vulnerability (CVE-2017-2602)
|
CVE-2017-2602
|
|
Medium
|
Jenkins CVE-2018-1000408 Vulnerability (CVE-2018-1000408)
|
CVE-2018-1000408
|
|
Medium
|
Jenkins CVE-2021-21682 Vulnerability (CVE-2021-21682)
|
CVE-2021-21682
|
|
Medium
|
Jenkins CVE-2023-27902 Vulnerability (CVE-2023-27902)
|
CVE-2023-27902
|
|
Medium
|
Jenkins CVE-2023-27904 Vulnerability (CVE-2023-27904)
|
CVE-2023-27904
|
|
Medium
|
Jenkins CVE-2023-43494 Vulnerability (CVE-2023-43494)
|
CVE-2023-43494
|
|
Medium
|
Jenkins CVE-2024-47804 Vulnerability (CVE-2024-47804)
|
CVE-2024-47804
|
|
Medium
|
Jenkins dashboard
|
CWE-200
|
CWE-200
|
Medium
|
Jenkins DEPRECATED: Code Vulnerability (CVE-2016-3721)
|
CVE-2016-3721
|
|
Medium
|
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-1000355)
|
CVE-2017-1000355
CWE-502
|
CWE-502
|
Medium
|
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2018-1999042)
|
CVE-2018-1999042
CWE-502
|
CWE-502
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-2064)
|
CVE-2014-2064
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3662)
|
CVE-2014-3662
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3667)
|
CVE-2014-3667
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3680)
|
CVE-2014-3680
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5317)
|
CVE-2015-5317
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5320)
|
CVE-2015-5320
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5321)
|
CVE-2015-5321
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-0790)
|
CVE-2016-0790
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-3723)
|
CVE-2016-3723
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-3724)
|
CVE-2016-3724
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-3727)
|
CVE-2016-3727
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-2600)
|
CVE-2017-2600
CWE-200
|
CWE-200
|
Medium
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-2606)
|
CVE-2017-2606
CWE-200
|
CWE-200
|
Medium
|