Looking for the vulnerability index of Invicti's legacy products?

Jenkins

Jenkins is a free and open source automation server. It helps automate the parts of software development related to building testing and deploying facilitating continuous integration and continuous delivery. It is a server-based system that runs in servlet containers such as Apache Tomcat.

Severity Summary:

Critical: 19 High: 58 Medium: 168 Low: 11
Reference
Title
Severity
Jenkins Vulnerability
High
Jenkins Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
High
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability
High
Jenkins Improper Input Validation Vulnerability
High
Jenkins Improper Input Validation Vulnerability
High
Jenkins Incorrect Default Permissions Vulnerability
High
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
High
Jenkins Improper Control of Generation of Code (Code Injection) Vulnerability
High
Jenkins Uncontrolled Resource Consumption Vulnerability
High
Jenkins Session Fixation Vulnerability
High
Jenkins Incorrect Authorization Vulnerability
High
Jenkins Observable Discrepancy Vulnerability
High
Jenkins Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
High
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
High
Jenkins Deserialization of Untrusted Data Vulnerability
High
Jenkins Improper Input Validation Vulnerability
High
Jenkins Other Vulnerability
High
Jenkins Reliance on Reverse DNS Resolution for a Security-Critical Action Vulnerability
High
Jenkins Integer Overflow or Wraparound Vulnerability
High
Jenkins Use of Insufficiently Random Values Vulnerability
High
Jenkins Improper Link Resolution Before File Access (Link Following) Vulnerability
High
Jenkins Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
High
Jenkins Improper Resource Shutdown or Release Vulnerability
High
Jenkins Vulnerability
High
Jenkins Vulnerability
High
Jenkins Deserialization of Untrusted Data Vulnerability
High
Jenkins Insufficient Verification of Data Authenticity Vulnerability
High
Jenkins Vulnerability
High
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
High
Jenkins Origin Validation Error Vulnerability
High