Vulnerabilities > Jenkins > High

DATE CVE VULNERABILITY TITLE RISK
2016-04-07 CVE-2016-0792 Improper Input Validation vulnerability in multiple products
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
network
low complexity
jenkins redhat CWE-20
8.8
2016-02-03 CVE-2015-7539 Insufficient Verification of Data Authenticity vulnerability in multiple products
The Plugins Manager in Jenkins before 1.640 and LTS before 1.625.2 does not verify checksums for plugin files referenced in update site data, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted plugin.
network
high complexity
jenkins redhat CWE-345
7.5
2016-02-03 CVE-2015-7538 Jenkins before 1.640 and LTS before 1.625.2 allow remote attackers to bypass the CSRF protection mechanism via unspecified vectors.
network
low complexity
jenkins redhat
8.8
2016-02-03 CVE-2015-7537 Cross-Site Request Forgery (CSRF) vulnerability in multiple products
Cross-site request forgery (CSRF) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via vectors related to the HTTP GET method.
network
low complexity
redhat jenkins CWE-352
8.8