Skip to content

Bump edu.hm.hafner:codingstyle-pom from 5.39.0 to 5.40.0 #1311

Bump edu.hm.hafner:codingstyle-pom from 5.39.0 to 5.40.0

Bump edu.hm.hafner:codingstyle-pom from 5.39.0 to 5.40.0 #1311

Status Success
Total duration 1m 1s
Artifacts
Check Markdown links
56s
Check Markdown links
Fit to window
Zoom out
Zoom in

Annotations

456 warnings
OWASP Dependency Check: CVE-2020-36843: cli-2.516.3.jar (shaded: net.i2p.crypto:eddsa:0.3.0)#L1
The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.
OWASP Dependency Check: CVE-2018-1000052: commons-jelly-tags-fmt-1.1-jenkins-20250616.jar#L1
fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7.
OWASP Dependency Check: CVE-2025-48924: commons-lang-2.6.jar#L1
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue. Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-48924 for details
OWASP Dependency Check: CVE-2016-9299: jenkins-core-2.516.3.jar: jenkins.exe#L1
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
OWASP Dependency Check: CVE-2017-1000353: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
OWASP Dependency Check: CVE-2018-1000861: jenkins-core-2.516.3.jar: jenkins.exe#L1
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
OWASP Dependency Check: CVE-2021-21690: jenkins-core-2.516.3.jar: jenkins.exe#L1
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
OWASP Dependency Check: CVE-2021-21691: jenkins-core-2.516.3.jar: jenkins.exe#L1
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
OWASP Dependency Check: CVE-2021-21692: jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
OWASP Dependency Check: CVE-2021-21693: jenkins-core-2.516.3.jar: jenkins.exe#L1
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
OWASP Dependency Check: CVE-2021-21694: jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
OWASP Dependency Check: CVE-2021-21696: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
OWASP Dependency Check: CVE-2024-23897: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
OWASP Dependency Check: CVE-2021-21685: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
OWASP Dependency Check: CVE-2021-21687: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
OWASP Dependency Check: CVE-2021-21689: jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
OWASP Dependency Check: CVE-2021-21697: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
OWASP Dependency Check: CVE-2017-1000354: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.
OWASP Dependency Check: CVE-2017-1000356: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts.
OWASP Dependency Check: CVE-2017-1000393: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of this launch method now requires the Run Scripts permission typically only granted to administrators.
OWASP Dependency Check: CVE-2017-2608: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
OWASP Dependency Check: CVE-2018-1999001: jenkins-core-2.516.3.jar: jenkins.exe#L1
A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
OWASP Dependency Check: CVE-2019-10384: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
OWASP Dependency Check: CVE-2020-2160: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.
OWASP Dependency Check: CVE-2021-21695: jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
OWASP Dependency Check: CVE-2023-43496: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
OWASP Dependency Check: CVE-2024-43044: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
OWASP Dependency Check: CVE-2020-2099: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
OWASP Dependency Check: CVE-2018-1000863: jenkins-core-2.516.3.jar: jenkins.exe#L1
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
OWASP Dependency Check: CVE-2017-1000504: jenkins-core-2.516.3.jar: jenkins.exe#L1
A race condition during Jenkins 2.94 and earlier; 2.89.1 and earlier startup could result in the wrong order of execution of commands during initialization. There is a very short window of time after startup during which Jenkins may no longer show the 'Please wait while Jenkins is getting ready to work' message but Cross-Site Request Forgery (CSRF) protection may not yet be effective.
OWASP Dependency Check: CVE-2018-1000194: jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
OWASP Dependency Check: CVE-2019-1003049: jenkins-core-2.516.3.jar: jenkins.exe#L1
Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.
OWASP Dependency Check: CVE-2021-21686: jenkins-core-2.516.3.jar: jenkins.exe#L1
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
OWASP Dependency Check: CVE-2023-43497: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
OWASP Dependency Check: CVE-2023-43498: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
OWASP Dependency Check: CVE-2021-21604: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.
OWASP Dependency Check: CVE-2021-21605: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.
OWASP Dependency Check: CVE-2023-35141: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
OWASP Dependency Check: CVE-2018-1000410: jenkins-core-2.516.3.jar: jenkins.exe#L1
An information exposure vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier, and the Stapler framework used by these releases, in core/src/main/java/org/kohsuke/stapler/RequestImpl.java, core/src/main/java/hudson/model/Descriptor.java that allows attackers with Overall/Administer permission or access to the local file system to obtain credentials entered by users if the form submission could not be successfully processed.
OWASP Dependency Check: CVE-2017-1000394: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-fileupload library with the denial-of-service vulnerability known as CVE-2016-3092. The fix for that vulnerability has been backported to the version of the library bundled with Jenkins.
OWASP Dependency Check: CVE-2018-1999002: jenkins-core-2.516.3.jar: jenkins.exe#L1
A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
OWASP Dependency Check: CVE-2018-1999043: jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in BasicAuthenticationFilter.java, BasicHeaderApiTokenAuthenticator.java that allows attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials.
OWASP Dependency Check: CVE-2019-10353: jenkins-core-2.516.3.jar: jenkins.exe#L1
CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.
OWASP Dependency Check: CVE-2021-21688: jenkins-core-2.516.3.jar: jenkins.exe#L1
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
OWASP Dependency Check: CVE-2021-28165: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
OWASP Dependency Check: CVE-2021-43859: jenkins-core-2.516.3.jar: jenkins.exe#L1
XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.
OWASP Dependency Check: CVE-2022-0538: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.
OWASP Dependency Check: CVE-2022-2048: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
OWASP Dependency Check: CVE-2022-34174: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.
OWASP Dependency Check: CVE-2023-27900: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service.
OWASP Dependency Check: CVE-2023-27901: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
OWASP Dependency Check: CVE-2023-36478: jenkins-core-2.516.3.jar: jenkins.exe#L1
Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
OWASP Dependency Check: CVE-2023-44487: jenkins-core-2.516.3.jar: jenkins.exe#L1
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
OWASP Dependency Check: CVE-2017-1000391: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulting in problems like overwriting of unrelated configuration files.
OWASP Dependency Check: CVE-2019-1003003: jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java that allows attackers with Overall/RunScripts permission to craft Remember Me cookies that would never expire, allowing e.g. to persist access to temporarily compromised user accounts.
OWASP Dependency Check: CVE-2019-1003004: jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time.
OWASP Dependency Check: CVE-2023-27899: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.
OWASP Dependency Check: CVE-2017-1000355: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void.
OWASP Dependency Check: CVE-2018-1000406: jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
OWASP Dependency Check: CVE-2018-1000408: jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that allows attackers without Overall/Read permission to access a specific URL on instances using the built-in Jenkins user database security realm that results in the creation of an ephemeral user record in memory.
OWASP Dependency Check: CVE-2018-1000864: jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
OWASP Dependency Check: CVE-2018-1000997: jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
OWASP Dependency Check: CVE-2018-1999044: jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
OWASP Dependency Check: CVE-2018-1999047: jenkins-core-2.516.3.jar: jenkins.exe#L1
A improper authorization vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in UpdateCenter.java that allows attackers to cancel a Jenkins restart scheduled through the update center.
OWASP Dependency Check: CVE-2018-6356: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.
OWASP Dependency Check: CVE-2019-10352: jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
OWASP Dependency Check: CVE-2021-21602: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
OWASP Dependency Check: CVE-2021-21607: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.
OWASP Dependency Check: CVE-2021-21683: jenkins-core-2.516.3.jar: jenkins.exe#L1
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.
OWASP Dependency Check: CVE-2024-43045: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
OWASP Dependency Check: CVE-2018-1000407: jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins.
OWASP Dependency Check: CVE-2021-21610: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering a formatted preview of markup passed as a query parameter, resulting in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup.
OWASP Dependency Check: CVE-2017-1000396: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. This library is widely used as a transitive dependency in Jenkins plugins. The fix for CVE-2012-6153 was backported to the version of commons-httpclient that is bundled in core and made available to plugins.
OWASP Dependency Check: CVE-2020-2100: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848.
OWASP Dependency Check: CVE-2017-2599: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321).
OWASP Dependency Check: CVE-2017-2601: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in parameter names and descriptions (SECURITY-353). Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions.
OWASP Dependency Check: CVE-2017-2607: jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users, or users with SCM access, could configure jobs or modify build scripts such that they print serialized console notes that perform cross-site scripting attacks on Jenkins users viewing the build logs.
OWASP Dependency Check: CVE-2017-2610: jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).
OWASP Dependency Check: CVE-2017-2612: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.
OWASP Dependency Check: CVE-2017-2613: jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).
OWASP Dependency Check: CVE-2018-1000170: jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions.
OWASP Dependency Check: CVE-2018-1000409: jenkins-core-2.516.3.jar: jenkins.exe#L1
A session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account.
OWASP Dependency Check: CVE-2018-1999005: jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
OWASP Dependency Check: CVE-2018-1999007: jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled.
OWASP Dependency Check: CVE-2018-1999045: jenkins-core-2.516.3.jar: jenkins.exe#L1
A improper authentication vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in SecurityRealm.java, TokenBasedRememberMeServices2.java that allows attackers with a valid cookie to remain logged in even if that feature is disabled.
OWASP Dependency Check: CVE-2019-1003050: jenkins-core-2.516.3.jar: jenkins.exe#L1
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
OWASP Dependency Check: CVE-2019-10401: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically Job/Configure).
OWASP Dependency Check: CVE-2019-10402: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.
OWASP Dependency Check: CVE-2019-10403: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the SCM tag name on the tooltip for SCM tag actions, resulting in a stored XSS vulnerability exploitable by users able to control SCM tag names for these actions.
OWASP Dependency Check: CVE-2019-10404: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the reason why a queue items is blcoked in tooltips, resulting in a stored XSS vulnerability exploitable by users able to control parts of the reason a queue item is blocked, such as label expressions not matching any idle executors.
OWASP Dependency Check: CVE-2019-10405: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
OWASP Dependency Check: CVE-2020-2103: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page.
OWASP Dependency Check: CVE-2020-2105: jenkins-core-2.516.3.jar: jenkins.exe#L1
REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks.
OWASP Dependency Check: CVE-2020-2161: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels.
OWASP Dependency Check: CVE-2020-2162: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not set Content-Security-Policy headers for files uploaded as file parameters to a build, resulting in a stored XSS vulnerability.
OWASP Dependency Check: CVE-2020-2163: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier improperly processes HTML content of list view column headers, resulting in a stored XSS vulnerability exploitable by users able to control column headers.
OWASP Dependency Check: CVE-2020-2220: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the agent name in the build time trend page, resulting in a stored cross-site scripting vulnerability.
OWASP Dependency Check: CVE-2020-2221: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.
OWASP Dependency Check: CVE-2020-2222: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the job name in the 'Keep this build forever' badge tooltip, resulting in a stored cross-site scripting vulnerability.
OWASP Dependency Check: CVE-2020-2223: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability.
OWASP Dependency Check: CVE-2020-2229: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.
OWASP Dependency Check: CVE-2020-2230: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.
OWASP Dependency Check: CVE-2020-2231: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.
OWASP Dependency Check: CVE-2021-21603: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability.
OWASP Dependency Check: CVE-2021-21608: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels.
OWASP Dependency Check: CVE-2021-21611: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.
OWASP Dependency Check: CVE-2023-39151: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents.
OWASP Dependency Check: CVE-2023-43495: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
OWASP Dependency Check: CVE-2025-27624: jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).
OWASP Dependency Check: CVE-2018-1000067: jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response.
OWASP Dependency Check: CVE-2018-1000068: jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
OWASP Dependency Check: CVE-2018-1000169: jenkins-core-2.516.3.jar: jenkins.exe#L1
An exposure of sensitive information vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in CLICommand.java and ViewOptionHandler.java that allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.
OWASP Dependency Check: CVE-2018-1999042: jenkins-core-2.516.3.jar: jenkins.exe#L1
A vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in XStream2.java that allows attackers to have Jenkins resolve a domain name when deserializing an instance of java.net.URL.
OWASP Dependency Check: CVE-2020-2101: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
OWASP Dependency Check: CVE-2020-2102: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier used a non-constant time comparison function when validating an HMAC.
OWASP Dependency Check: CVE-2021-21609: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.
OWASP Dependency Check: CVE-2021-21615: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
OWASP Dependency Check: CVE-2023-27904: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.
OWASP Dependency Check: CVE-2025-59474: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check in the sidepanel of a page intentionally accessible to users lacking Overall/Read permission, allowing attackers without Overall/Read permission to list agent names through its sidepanel executors widget.
OWASP Dependency Check: CVE-2025-59476: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control log message contents to insert line break characters, followed by forged log messages that may mislead administrators reviewing log output.
OWASP Dependency Check: CVE-2017-1000392: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters.
OWASP Dependency Check: CVE-2019-10383: jenkins-core-2.516.3.jar: jenkins.exe#L1
A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages.
OWASP Dependency Check: CVE-2019-10406: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.
OWASP Dependency Check: CVE-2017-17383: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins through 2.93 allows remote authenticated administrators to conduct XSS attacks via a crafted tool name in a job configuration form, as demonstrated by the JDK tool in Jenkins core and the Ant tool in the Ant plugin, aka SECURITY-624.
OWASP Dependency Check: CVE-2023-27903: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used.
OWASP Dependency Check: CVE-2017-1000395: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator.
OWASP Dependency Check: CVE-2017-1000398: jenkins-core-2.516.3.jar: jenkins.exe#L1
The remote API in Jenkins 2.73.1 and earlier, 2.83 and earlier at /computer/(agent-name)/api showed information about tasks (typically builds) currently running on that agent. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only shows information about accessible tasks.
OWASP Dependency Check: CVE-2017-1000399: jenkins-core-2.516.3.jar: jenkins.exe#L1
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API endpoint is now only available for tasks that the current user has access to.
OWASP Dependency Check: CVE-2017-1000400: jenkins-core-2.516.3.jar: jenkins.exe#L1
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only lists upstream and downstream projects that the current user has access to.
OWASP Dependency Check: CVE-2017-2598: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).
OWASP Dependency Check: CVE-2017-2600: jenkins-core-2.516.3.jar: jenkins.exe#L1
In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343).
OWASP Dependency Check: CVE-2017-2602: jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to an improper blacklisting of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents (SECURITY-358).
OWASP Dependency Check: CVE-2017-2604: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins before versions 2.44, 2.32.2 low privilege users were able to act on administrative monitors due to them not being consistently protected by permission checks (SECURITY-371).
OWASP Dependency Check: CVE-2017-2606: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to an information exposure in the internal API that allows access to item names that should not be visible (SECURITY-380). This only affects anonymous users (other users legitimately have access) that were able to get a list of items via an UnprotectedRootAction.
OWASP Dependency Check: CVE-2017-2609: jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.
OWASP Dependency Check: CVE-2017-2611: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.
OWASP Dependency Check: CVE-2018-1000192: jenkins-core-2.516.3.jar: jenkins.exe#L1
A information exposure vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in AboutJenkins.java, ListPluginsCommand.java that allows users with Overall/Read access to enumerate all installed plugins.
OWASP Dependency Check: CVE-2018-1000193: jenkins-core-2.516.3.jar: jenkins.exe#L1
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI.
OWASP Dependency Check: CVE-2018-1000195: jenkins-core-2.516.3.jar: jenkins.exe#L1
A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.
OWASP Dependency Check: CVE-2018-1000862: jenkins-core-2.516.3.jar: jenkins.exe#L1
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
OWASP Dependency Check: CVE-2018-1999003: jenkins-core-2.516.3.jar: jenkins.exe#L1
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds.
OWASP Dependency Check: CVE-2018-1999004: jenkins-core-2.516.3.jar: jenkins.exe#L1
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in SlaveComputer.java that allows attackers with Overall/Read permission to initiate agent launches, and abort in-progress agent launches.
OWASP Dependency Check: CVE-2018-1999006: jenkins-core-2.516.3.jar: jenkins.exe#L1
A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade.
OWASP Dependency Check: CVE-2018-1999046: jenkins-core-2.516.3.jar: jenkins.exe#L1
A exposure of sensitive information vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in Computer.java that allows attackers With Overall/Read permission to access the connection log for any agent.
OWASP Dependency Check: CVE-2019-10354: jenkins-core-2.516.3.jar: jenkins.exe#L1
A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information.
OWASP Dependency Check: CVE-2020-2104: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier allowed users with Overall/Read access to view a JVM memory usage chart.
OWASP Dependency Check: CVE-2020-2251: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.
OWASP Dependency Check: CVE-2021-21606: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.
OWASP Dependency Check: CVE-2021-21639: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
OWASP Dependency Check: CVE-2021-21640: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.
OWASP Dependency Check: CVE-2021-21670: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
OWASP Dependency Check: CVE-2021-21682: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
OWASP Dependency Check: CVE-2022-20612: jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
OWASP Dependency Check: CVE-2023-27902: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents.
OWASP Dependency Check: CVE-2024-47803: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
OWASP Dependency Check: CVE-2024-47804: jenkins-core-2.516.3.jar: jenkins.exe#L1
If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.
OWASP Dependency Check: CVE-2025-27622: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.
OWASP Dependency Check: CVE-2025-27623: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.
OWASP Dependency Check: CVE-2025-27625: jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.
OWASP Dependency Check: CVE-2025-31720: jenkins-core-2.516.3.jar: jenkins.exe#L1
A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent, gaining access to its configuration.
OWASP Dependency Check: CVE-2025-31721: jenkins-core-2.516.3.jar: jenkins.exe#L1
A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining access to encrypted secrets in its configuration.
OWASP Dependency Check: CVE-2025-59475: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).
OWASP Dependency Check: CVE-2017-2603: jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362).
OWASP Dependency Check: CVE-2017-1000401: jenkins-core-2.516.3.jar: jenkins.exe#L1
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
OWASP Dependency Check: CVE-2023-52070: jfreechart-1.0.19.jar#L1
JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
OWASP Dependency Check: CVE-2023-50572: jline-2.14.6.jar#L1
An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error.
OWASP Dependency Check: CVE-2015-1809: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.
OWASP Dependency Check: CVE-2015-1811: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.
OWASP Dependency Check: CVE-2013-2034: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
OWASP Dependency Check: CVE-2012-6073: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
OWASP Dependency Check: CVE-2012-0324: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0325.
OWASP Dependency Check: CVE-2012-0325: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0324.
OWASP Dependency Check: CVE-2012-6072: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
CRLF injection vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
OWASP Dependency Check: CVE-2012-6074: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
OWASP Dependency Check: CVE-2013-0158: remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.
OWASP Dependency Check: CVE-2025-41249: spring-core-6.2.8.jar#L1
The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions. Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature. You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces. This CVE is published in conjunction with CVE-2025-41248 https://spring.io/security/cve-2025-41248 . Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-41249 for details
OWASP Dependency Check: CVE-2025-41242: spring-core-6.2.8.jar#L1
Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container. An application can be vulnerable when all the following are true: * the application is deployed as a WAR or with an embedded Servlet container * the Servlet container does not reject suspicious sequences https://jakarta.ee/specifications/servlet/6.1/jakarta-servlet-spec-6.1.html#uri-path-canonicalization * the application serves static resources https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title  with Spring resource handling We have verified that applications deployed on Apache Tomcat or Eclipse Jetty are not vulnerable, as long as default security features are not disabled in the configuration. Because we cannot check exploits against all Servlet containers and configuration variants, we strongly recommend upgrading your application. Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-41242 for details
OWASP Dependency Check: CVE-2025-41248: spring-security-core-6.5.1.jar#L1
The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass. Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature. You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces. This CVE is published in conjunction with CVE-2025-41249 https://spring.io/security/cve-2025-41249 . Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-41248 for details
OWASP Dependency Check: CVE-2020-7760: stapler-adjunct-codemirror-1.3.jar#L1
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
OWASP Dependency Check: CVE-2023-40743: axis-1.4.jar#L1
** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
OWASP Dependency Check: CVE-2019-0227: axis-1.4.jar#L1
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
OWASP Dependency Check: CVE-2018-8032: axis-1.4.jar#L1
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
OWASP Dependency Check: CVE-2012-5784: axis-1.4.jar#L1
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
OWASP Dependency Check: CVE-2014-3596: axis-1.4.jar#L1
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
OWASP Dependency Check: CVE-2007-2353: axis-1.4.jar#L1
Apache Axis 1.0 allows remote attackers to obtain sensitive information by requesting a non-existent WSDL file, which reveals the installation path in the resulting exception message.
OWASP Dependency Check: CVE-2025-8916: bcpkix-jdk15on-1.64.jar#L1
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.
OWASP Dependency Check: CVE-2023-33202: bcpkix-jdk15on-1.64.jar#L1
Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. (For users of the FIPS Java API: BC-FJA 1.0.2.3 and earlier are affected; BC-FJA 1.0.2.4 is fixed.)
OWASP Dependency Check: CVE-2024-34447: bcprov-jdk15on-1.64.jar#L1
bouncycastle - Improper Validation of Certificate with Host Mismatch
OWASP Dependency Check: CVE-2024-29857: bcprov-jdk15on-1.64.jar#L1
An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
OWASP Dependency Check: CVE-2024-30171: bcprov-jdk15on-1.64.jar#L1
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
OWASP Dependency Check: CVE-2020-15522: bcprov-jdk15on-1.64.jar#L1
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
OWASP Dependency Check: CVE-2020-0187: bcprov-jdk15on-1.64.jar#L1
In engineSetMode of BaseBlockCipher.java, there is a possible incorrect cryptographic algorithm chosen due to an incomplete comparison. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148517383
OWASP Dependency Check: CVE-2023-33202: bcprov-jdk15on-1.64.jar#L1
Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. (For users of the FIPS Java API: BC-FJA 1.0.2.3 and earlier are affected; BC-FJA 1.0.2.4 is fixed.)
OWASP Dependency Check: CVE-2023-33201: bcprov-jdk15on-1.64.jar#L1
Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
OWASP Dependency Check: CVE-2024-25638: dnsjava-3.1.0.jar#L1
dnsjava is an implementation of DNS in Java. Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones. This vulnerability is fixed in 3.6.0.
OWASP Dependency Check: CVE-2019-16541: jira-api-1.3.jar#L1
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.
OWASP Dependency Check: CVE-2018-1000412: jira-api-1.3.jar#L1
An improper authorization vulnerability exists in Jenkins Jira Plugin 3.0.1 and earlier in JiraSite.java that allows attackers with Overall/Read access to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
OWASP Dependency Check: CVE-2023-49673: jira-api-1.3.jar#L1
A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.
OWASP Dependency Check: CVE-2023-49653: jira-api-1.3.jar#L1
Jenkins Jira Plugin 3.11 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
OWASP Dependency Check: CVE-2022-29041: jira-api-1.3.jar#L1
Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
OWASP Dependency Check: CVE-2015-1809: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.
OWASP Dependency Check: CVE-2015-1811: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.
OWASP Dependency Check: CVE-2013-2034: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
OWASP Dependency Check: CVE-2012-6073: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
OWASP Dependency Check: CVE-2012-0324: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0325.
OWASP Dependency Check: CVE-2012-0325: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0324.
OWASP Dependency Check: CVE-2012-6072: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
CRLF injection vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
OWASP Dependency Check: CVE-2012-6074: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
OWASP Dependency Check: CVE-2013-0158: remoting-3352.v17a_fb_4b_2773f.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.
Not covered lines: io/jenkins/plugins/coverage/metrics/charts/TrendChart.java#L65
Lines 65-71 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/source/Messages.java#L20
Lines 20-49 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageTool.java#L86
Lines 86-87 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageTool.java#L131
Lines 131-136 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageTool.java#L155
Lines 155-201 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L67
Lines 67-70 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L124
Lines 124-125 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L179
Lines 179-180 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L187
Lines 187-204 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L171
Lines 171-172 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L186
Lines 186-187 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L201
Lines 201-202 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L216
Lines 216-220 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L264
Lines 264-265 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L327
Lines 327-328 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/CoverageStep.java#L401
Lines 401-489 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L36
Lines 36-79 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L99
Lines 99-119 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L139
Lines 139-203 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L223
Lines 223-243 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L317
Lines 317-367 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L411
Lines 411-431 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L451
Lines 451-491 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L511
Lines 511-531 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L571
Lines 571-593 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L613
Lines 613-663 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L683
Lines 683-759 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L783
Lines 783-803 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L823
Lines 823-833 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L855
Lines 855-867 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L891
Lines 891-901 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L951
Lines 951-973 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L1013
Lines 1013-1023 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L1053
Lines 1053-1063 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/steps/Messages.java#L1083
Lines 1083-1117 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L35
Lines 35-145 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L175
Lines 175-287 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L307
Lines 307-367 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L399
Lines 399-449 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L521
Lines 521-653 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L683
Lines 683-693 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L723
Lines 723-813 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L833
Lines 833-893 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L925
Lines 925-997 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/model/Messages.java#L1027
Lines 1027-1097 are not covered by tests
Not covered lines: io/jenkins/plugins/coverage/metrics/color/ColorScheme.java#L8
Lines 8-20 are not covered by tests
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/TreeMapNodeConverter.java#L69
Line 69 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/TreeMapNodeConverter.java#L81
Line 81 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/TreeMapNodeConverter.java#L82
Line 82 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/TreeMapNodeConverter.java#L83
Line 83 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/TreeMapNodeConverter.java#L90
Line 90 is only partially covered, 2 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/TreeMapNodeConverter.java#L98
Line 98 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/charts/CoverageTrendChart.java#L49
Line 49 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodePainter.java#L97
Line 97 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodePainter.java#L238
Line 238 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodePainter.java#L243
Line 243 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodePainter.java#L262
Line 262 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodeFacade.java#L305
Line 305 is only partially covered, 2 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodeFacade.java#L311
Line 311 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodeFacade.java#L316
Line 316 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/source/SourceCodeFacade.java#L319
Line 319 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L191
Line 191 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L207
Line 207 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L225
Line 225 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L233
Line 233 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L297
Line 297 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L368
Line 368 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L478
Line 478 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageChecksPublisher.java#L485
Line 485 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L382
Line 382 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L395
Line 395 is only partially covered, 2 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L400
Line 400 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L434
Line 434 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L452
Line 452 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L493
Line 493 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L499
Line 499 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L549
Line 549 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L554
Line 554 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L564
Line 564 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageRecorder.java#L570
Line 570 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageMetricColumn.java#L196
Line 196 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageMetricColumn.java#L241
Line 241 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageXmlStream.java#L139
Line 139 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageXmlStream.java#L157
Line 157 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageXmlStream.java#L187
Line 187 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageXmlStream.java#L216
Line 216 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageXmlStream.java#L229
Line 229 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageXmlStream.java#L241
Line 241 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L117
Line 117 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L120
Line 120 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L161
Line 161 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L166
Line 166 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/PathResolver.java#L172
Line 172 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageTableModel.java#L165
Line 165 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageTableModel.java#L378
Line 378 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageTableModel.java#L405
Line 405 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageBuildAction.java#L336
Line 336 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageBuildAction.java#L391
Line 391 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageBuildAction.java#L456
Line 456 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageBuildAction.java#L503
Line 503 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageBuildAction.java#L528
Line 528 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageReporter.java#L102
Line 102 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageReporter.java#L114
Line 114 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageReporter.java#L141
Line 141 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageReporter.java#L192
Line 192 is only partially covered, 3 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageReporter.java#L215
Line 215 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageReporter.java#L227
Line 227 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageViewModel.java#L364
Line 364 is only partially covered, 3 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageViewModel.java#L406
Line 406 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageViewModel.java#L442
Line 442 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageViewModel.java#L445
Line 445 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CoverageViewModel.java#L480
Line 480 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L45
Line 45 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L123
Line 123 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L126
Line 126 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L145
Line 145 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L168
Line 168 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L170
Line 170 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/FileChangesProcessor.java#L248
Line 248 is only partially covered, 2 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CodeDeltaCalculator.java#L171
Line 171 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/CodeDeltaCalculator.java#L226
Line 226 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/steps/TrendChartFactory.java#L94
Line 94 is only partially covered, 2 branches are missing
Partially covered line: io/jenkins/plugins/coverage/metrics/model/CoverageStatistics.java#L79
Line 79 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/color/CoverageLevel.java#L62
Line 62 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/color/ColorProvider.java#L37
Line 37 is only partially covered, one branch is missing
Partially covered line: io/jenkins/plugins/coverage/metrics/color/CoverageChangeTendency.java#L37
Line 37 is only partially covered, one branch is missing