Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Jenkins
  4. Git client

Known Vulnerabilities in Git client

Show more ↓
6.1.0
6.0.0
5.0.0
4.7.0
4.6.0
4.5.0
4.4.0
4.3.0
4.2.0
4.1.0
4.0.0
3.13.1
3.13.0
3.12.4
3.12.2
3.12.1
3.12.0
3.11.3
3.11.2
3.11.1
3.11.0
3.10.1
3.10.0.2
3.10.0.1
3.10.0
3.9.0
3.8.0
3.7.2
3.7.1
3.7.0
3.6.0
3.5.1
3.5.0
3.4.2
3.4.1
3.4.0
3.3.2
3.3.1
3.3.0
3.2.1
3.2.0
3.1.1
3.1.0
3.0.0
2.9.0
2.8.6
2.8.5
2.8.4
2.8.3
2.8.2
2.8.1
2.8.0
2.7.7.1
2.7.7
2.7.6
2.7.5
2.7.4.1
2.7.4
2.7.3.1
2.7.3
2.7.2
2.7.1
2.7.0
2.6.0
2.5.0
2.4.6
2.4.5
2.4.4
2.4.3
2.4.2
2.4.1
2.4.0
2.3.0
2.2.1
2.2.0
2.1.0
2.0.0
1.21.0
1.20.2
1.20.1
1.20.0
1.19.7
1.19.6
1.19.5
1.19.4
1.19.3
1.19.2
1.19.1
1.19.0
1.18.0
1.17.1
1.17.0
1.16.1
1.16.0
1.15.0
1.14.1
1.14.0
1.13.0
1.12.0
1.11.1
1.11.0
1.10.2
1.10.1
1.10.0
1.9.2
1.9.1
1.9.0
1.8.1
1.8.0
1.7.0
1.6.6
1.6.5
1.6.4
1.6.3
1.6.2
1.6.1
1.6.0
1.5.1
1.5.0
1.4.6
1.4.5
1.4.4
1.4.3
1.4.2
1.4.1
1.4.0
1.3.0
1.2.0
1.1.2
1.1.1
1.1
1.0.7
1.0.6
1.0.5
1.0.4
1.0.3
1.0.2
1.0.1
1.0.0



Key Exchange without Entity Authentication in Jenkins Git client plugin28 Jul, 2022
Medium Patched
Remote code execution in Git client plugin for Jenkins16 Sep, 2019
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: June 6, 2025
  • New PathWiper malware targets critical infrastructure in Ukraine
  • US seizes 145 domains linked to BidenCash carding forum
  • Hackers target multinational firms in Salesforce data breach scheme
  • Hacker targets GitHub users with trojanized code laced with backdoors
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.