Search for packages
| purl | pkg:maven/org.jenkins-ci.main/jenkins-core@2.121 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-8x6t-vhae-kkd8 | Information Exposure An information exposure vulnerability exists in Jenkins that allows users with Overall/Read access to enumerate all installed plugins. |
CVE-2018-1000192
GHSA-2w4x-rxp7-grg7 |
| VCID-df66-65bh-3fhy | Cross-Site Request Forgery (CSRF) A server-side request forgery vulnerability exists in Jenkins that allows users with Overall/Read permission to have Jenkins submit an HTTP GET request to an arbitrary URL and learn whether the response is successful or not. |
CVE-2018-1000195
GHSA-rgmj-mccj-h9mx |
| VCID-h88g-ywc5-1ycw | Injection Vulnerability An improper neutralization of control sequences vulnerability exists in Jenkins in `HudsonPrivateSecurityRealm.java` that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI. |
CVE-2018-1000193
GHSA-7592-93rm-6gpx |
| VCID-pdf9-n6qs-ybcc | Path Traversal A path traversal vulnerability exists in Jenkins in `FilePath.java`, `SoloFilePathFilter.java` that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection. |
CVE-2018-1000194
GHSA-x646-m7x2-gcp7 |