Jenkins 2.441 and earlier, LTS 2.426.2 and earlier CLI vulnerabilit
Reporter | Title | Published | Views | Family All 84 |
---|---|---|---|---|
![]() | CVE-2024-23897 | 24 Jan 202417:52 | – | cvelist |
![]() | Critical Remote Code Execution Flaws Uncovered in Jenkins | 1 Feb 202406:56 | – | hivepro |
![]() | Jenkins 2.441 / LTS 2.426.3 Arbitrary File Read Exploit | 29 Jan 202400:00 | – | zdt |
![]() | Exploit for Path Traversal in Jenkins | 11 Nov 202401:43 | – | githubexploit |
![]() | Exploit for Path Traversal in Jenkins | 19 Feb 202402:29 | – | githubexploit |
![]() | Exploit for Path Traversal in Jenkins | 26 Feb 202403:07 | – | githubexploit |
![]() | Exploit for Path Traversal in Jenkins | 29 Jan 202404:41 | – | githubexploit |
![]() | Exploit for Path Traversal in Jenkins | 1 Nov 202401:16 | – | githubexploit |
![]() | Exploit for Path Traversal in Jenkins | 28 Jul 202419:16 | – | githubexploit |
![]() | Exploit for Path Traversal in Jenkins | 30 Sep 202416:38 | – | githubexploit |
[
{
"defaultStatus": "affected",
"product": "Jenkins",
"vendor": "Jenkins Project",
"versions": [
{
"lessThan": "1.606",
"status": "unaffected",
"version": "0",
"versionType": "maven"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "2.442",
"versionType": "maven"
},
{
"lessThan": "2.426.*",
"status": "unaffected",
"version": "2.426.3",
"versionType": "maven"
},
{
"lessThan": "2.440.*",
"status": "unaffected",
"version": "2.440.1",
"versionType": "maven"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo