Jenkins Improper Input Validation Vulnerability
Jenkins Improper Access Control Vulnerability
Jenkins Insufficient Verification of Data Authenticity Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Improper Control of Generation of Code (Code Injection) Vulnerability
Jenkins Session Fixation Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Improper Link Resolution Before File Access (Link Following) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Uncontrolled Resource Consumption Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Observable Discrepancy Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Incorrect Default Permissions Vulnerability
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Origin Validation Error Vulnerability
Jenkins Integer Overflow or Wraparound Vulnerability
Jenkins Improper Check for Unusual or Exceptional Conditions Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability
Jenkins Incorrect Authorization Vulnerability
Apache Traffic Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability