High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) Vulnerability
Jenkins Other Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Uncontrolled Resource Consumption Vulnerability
Jenkins Improper Input Validation Vulnerability
Jenkins Improper Access Control Vulnerability
Jenkins Vulnerability
Jenkins Vulnerability
Jenkins Insufficient Verification of Data Authenticity Vulnerability
Jenkins Vulnerability
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability
Jenkins Permissions Privileges and Access Controls Vulnerability
Jenkins Improper Control of Generation of Code (Code Injection) Vulnerability
Jenkins Session Fixation Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Improper Link Resolution Before File Access (Link Following) Vulnerability
Jenkins Deserialization of Untrusted Data Vulnerability
Jenkins Uncontrolled Resource Consumption Vulnerability
Jenkins Incorrect Authorization Vulnerability
Jenkins Observable Discrepancy Vulnerability
Jenkins Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Jenkins Incorrect Default Permissions Vulnerability
Jenkins Unrestricted Upload of File with Dangerous Type Vulnerability
Jenkins Vulnerability
Jenkins Missing Authorization Vulnerability
Jenkins Integer Overflow or Wraparound Vulnerability