← All images

jenkins

Updated: 2026-04-29 05:50 UTC  |  Commit: d48be5a

PackageVersionSeverityCVEFix VersionDescription
bcpg-jdk18on1.83HIGHGHSA-cj8j-37rh-84751.84Bouncy Castle Uncontrolled Resource Consumption vulnerability
glibc2.43-r6HIGHCVE-2026-5928n/aCalling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte
bcprov-jdk18on1.83HIGHGHSA-p93r-85wp-75v31.84Bouncy Castle Has Covert Timing Channel Vulnerability
jetty-http12.1.6HIGHGHSA-355h-qmc2-wpwf12.1.7Jetty has HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
jackson-core3.1.0HIGHGHSA-2m67-wjpj-xhg93.1.1Jackson Core: Document length constraint bypass in blocking, async, and DataInput parsers
bcprov-jdk18on1.83MEDIUMGHSA-c3fc-8qff-9hwx1.84Bouncy Castle has an LDAP injection
commons-lang2.6MEDIUMGHSA-j288-q9x7-2f5vn/aApache Commons Lang is vulnerable to Uncontrolled Recursion when processing long inputs
spring-security-core6.5.9MEDIUMGHSA-x2wq-9x2f-fhj76.5.10Spring Security Core has a TOCTOU race condition when One-Time Token login with JdbcOneTimeTokenService is configured
bcpkix-jdk18on1.83MEDIUMGHSA-wg6q-6289-32hp1.84Bouncy Castle Crypto Package For Java: Use of a Broken or Risky Cryptographic Algorithm vulnerability in bcpkix modules