8.2

CVSS4.0

CVE-2025-68704 - Jervis has a Weak Random for Timing Attack Mitigation

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.

πŸ“… Published: Jan. 13, 2026, 7:29 p.m. πŸ”„ Last Modified: Jan. 20, 2026, 5:36 p.m.

8.7

CVSS4.0

CVE-2025-68703 - Jervis has a Salt for PBKDF2 derived from password

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the salt is derived from sha256Sum(passphrase). Two encryption operations with the same password will have the same derived key. This vulnerability is fixed in 2.2.

πŸ“… Published: Jan. 13, 2026, 7:27 p.m. πŸ”„ Last Modified: Jan. 20, 2026, 5:13 p.m.

8.7

CVSS4.0

CVE-2025-68702 - Jervis has a SHA-256 Hex String Padding Bug

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes which equates to 64 hex characters. This vulnerability is fixed in 2.2.

πŸ“… Published: Jan. 13, 2026, 7:26 p.m. πŸ”„ Last Modified: Jan. 20, 2026, 5:13 p.m.

8.7

CVSS4.0

CVE-2025-68701 - Jervis has Deterministic AES IV Derivation from Passphrase

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses deterministic AES IV derivation from a passphrase. This vulnerability is fixed in 2.2.

πŸ“… Published: Jan. 13, 2026, 7:21 p.m. πŸ”„ Last Modified: Jan. 20, 2026, 5:12 p.m.

8.7

CVSS4.0

CVE-2025-68931 - Jervis has AES CBC Mode Without Authentication

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, AES/CBC/PKCS5Padding lacks authentication, making it vulnerable to padding oracle attacks and ciphertext manipulation. This vulnerability is fixed in 2.2.

πŸ“… Published: Jan. 13, 2026, 7:17 p.m. πŸ”„ Last Modified: Jan. 20, 2026, 5:37 p.m.

8.7

CVSS4.0

CVE-2025-68698 - Jervis has an RSA PKCS#1 v1.5 Padding Vulnerability

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses PKCS1Encoding which is vulnerable to Bleichenbacher padding oracle attacks. Modern systems should use OAEP (Optimal Asymmetric Encryption Padding). This vulnerability is fixed in 2.2.

πŸ“… Published: Jan. 13, 2026, 7:16 p.m. πŸ”„ Last Modified: Jan. 20, 2026, 5:11 p.m.

6.6

CVSS3.1

CVE-2026-22791 - openCryptoki incorrectly calculates the buffer size in C_WrapKey with CKM_ECDH_AES_KEY_WRAP

openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public k…

πŸ“… Published: Jan. 13, 2026, 7:06 p.m. πŸ”„ Last Modified: Jan. 14, 2026, 4:25 p.m.

7.8

CVSS3.1

CVE-2026-21283 - Bridge | Heap-based Buffer Overflow (CWE-122)

Bridge versions 15.1.2, 16.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“… Published: Jan. 13, 2026, 6:48 p.m. πŸ”„ Last Modified: Jan. 14, 2026, 7:28 p.m.

7.8

CVSS3.1

CVE-2026-21281 - InCopy | Heap-based Buffer Overflow (CWE-122)

InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“… Published: Jan. 13, 2026, 6:45 p.m. πŸ”„ Last Modified: Jan. 14, 2026, 7:28 p.m.

5.3

CVSS3.1

CVE-2025-68949 - n8n has a Webhook Node IP Whitelist Bypass via Partial String Matching

n8n is an open source workflow automation platform. From 1.36.0 to before 2.2.0, the Webhook node’s IP whitelist validation performed partial string matching instead of exact IP comparison. As a result, an incoming request could be accepted if the source IP address merely contained the configured w…

πŸ“… Published: Jan. 13, 2026, 6:43 p.m. πŸ”„ Last Modified: Jan. 16, 2026, 6:47 p.m.
Total resulsts: 328299
Page 87 of 32,830
Β« previous page Β» next page
Filters