296,746
Total vulnerabilities in the database
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/CONFIGURE permission to bypass intended restrictions and create or destroy arbitrary jobs via unspecified vectors.
| Software | From | Fixed in |
|---|---|---|
| jenkins / jenkins | - | 1.565.2.x |
| jenkins / jenkins | - | 1.582.x |
| redhat / openshift | - | 3.1.x |
org.jenkins-ci.main / jenkins-core
|
1.566 | 1.583 |
org.jenkins-ci.main / jenkins-core
|
- | 1.565.3 |