Bump actions/upload-artifact from 4 to 5 #3828
check-md-links.yml
on: push
Check Markdown links
1m 38s
Annotations
899 warnings
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/util/IssuesStatistics.java#L48
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/util/IssuesStatistics.java#L49
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ToolSelection.java#L32
hudson.model.AbstractDescribableImpl in hudson.model has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ToolSelection.java#L77
containsAnyIgnoreCase(java.lang.CharSequence,java.lang.CharSequence...) in org.apache.commons.lang3.StringUtils has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L155
<T>defaultIfNull(T,T) in org.apache.commons.lang3.ObjectUtils has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/Tool.java#L39
hudson.model.AbstractDescribableImpl in hudson.model has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/columns/WarningsAppearanceConfiguration.java#L52
possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L68
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L69
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L70
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L266
possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L406
previous possible 'this' escape happens here via invocation
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L412
previous possible 'this' escape happens here via invocation
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L416
previous possible 'this' escape happens here via invocation
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/filter/RegexpFilter.java#L31
hudson.model.AbstractDescribableImpl in hudson.model has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ReportXmlStream.java#L73
found raw type: java.lang.Class
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ReportXmlStream.java#L80
found raw type: java.util.Collection
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ReportXmlStream.java#L87
found raw type: java.lang.Class
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ReportXmlStream.java#L108
found raw type: java.lang.Class
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/model/ReportXmlStream.java#L136
found raw type: java.lang.Class
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/AnnotatedReport.java#L38
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L89
removeEnd(java.lang.String,java.lang.String) in org.apache.commons.lang3.StringUtils has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L263
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L264
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L266
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L866
found raw type: hudson.model.AbstractProject
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/util/WarningsQualityGate.java#L64
possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/ToolProxy.java#L19
hudson.model.AbstractDescribableImpl in hudson.model has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L57
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L74
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L71
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L74
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L83
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L99
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L241
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L242
non-transient instance field of a serializable class declared with a non-serializable type
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L213
<C>lookupCredentials(java.lang.Class<C>,hudson.model.Item,org.acegisecurity.Authentication,java.util.List<com.cloudbees.plugins.credentials.domains.DomainRequirement>) in com.cloudbees.plugins.credentials.CredentialsProvider has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L367
<C>lookupCredentials(java.lang.Class<C>,hudson.model.Item,org.acegisecurity.Authentication,java.util.List<com.cloudbees.plugins.credentials.domains.DomainRequirement>) in com.cloudbees.plugins.credentials.CredentialsProvider has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L405
<C>listCredentials(java.lang.Class<C>,hudson.model.Item,org.acegisecurity.Authentication,java.util.List<com.cloudbees.plugins.credentials.domains.DomainRequirement>,com.cloudbees.plugins.credentials.CredentialsMatcher) in com.cloudbees.plugins.credentials.CredentialsProvider has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L43
hudson.model.AbstractDescribableImpl in hudson.model has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L87
containsAny(java.lang.CharSequence,java.lang.CharSequence...) in org.apache.commons.lang3.StringUtils has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L215
<T>defaultIfNull(T,T) in org.apache.commons.lang3.ObjectUtils has been deprecated
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L43
possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
plugin/src/main/java/io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L259
removeStart(java.lang.String,java.lang.String) in org.apache.commons.lang3.StringUtils has been deprecated
|
|
Java Compiler: compiler:testCompile:
plugin/target/generated-test-sources/assertj-assertions/io/jenkins/plugins/analysis/core/assertions/Assertions.java#L523
assertThat(io.jenkins.plugins.analysis.core.model.StaticAnalysisLabelProvider.AgeBuilder) in io.jenkins.plugins.analysis.core.assertions.Assertions is potentially ambiguous with assertThat(io.jenkins.plugins.analysis.core.model.ResultSelector) in io.jenkins.plugins.analysis.core.assertions.Assertions
|
|
Java Compiler: compiler:testCompile:
plugin/target/generated-test-sources/assertj-assertions/io/jenkins/plugins/analysis/core/assertions/Assertions.java#L379
assertThat(io.jenkins.plugins.analysis.core.model.LabelProviderFactory.StaticAnalysisToolFactory) in io.jenkins.plugins.analysis.core.assertions.Assertions is potentially ambiguous with assertThat(io.jenkins.plugins.analysis.core.model.DescriptionProvider) in io.jenkins.plugins.analysis.core.assertions.Assertions
|
|
Java Compiler: compiler:testCompile:
plugin/src/test/java/io/jenkins/plugins/analysis/core/testutil/FormValidationAssert.java#L114
contains(java.lang.CharSequence,java.lang.CharSequence) in org.apache.commons.lang3.StringUtils has been deprecated
|
|
Java Compiler: compiler:testCompile:
plugin/src/test/java/io/jenkins/plugins/archunit/PluginArchitectureTest.java#L84
Varargs method could cause heap pollution from non-reifiable varargs parameter allowedExceptions
|
|
Java Compiler: compiler:testCompile:
plugin/target/generated-test-sources/assertj-assertions/io/jenkins/plugins/analysis/core/assertions/SoftAssertions.java#L522
assertThat(io.jenkins.plugins.analysis.core.model.StaticAnalysisLabelProvider.AgeBuilder) in io.jenkins.plugins.analysis.core.assertions.SoftAssertions is potentially ambiguous with assertThat(io.jenkins.plugins.analysis.core.model.ResultSelector) in io.jenkins.plugins.analysis.core.assertions.SoftAssertions
|
|
Java Compiler: compiler:testCompile:
plugin/target/generated-test-sources/assertj-assertions/io/jenkins/plugins/analysis/core/assertions/SoftAssertions.java#L378
assertThat(io.jenkins.plugins.analysis.core.model.LabelProviderFactory.StaticAnalysisToolFactory) in io.jenkins.plugins.analysis.core.assertions.SoftAssertions is potentially ambiguous with assertThat(io.jenkins.plugins.analysis.core.model.DescriptionProvider) in io.jenkins.plugins.analysis.core.assertions.SoftAssertions
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/AnalysisSummary.java#L132
removeStart(String,String) in StringUtils has been deprecated
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/AnalysisSummary.java#L331
containsIgnoreCase(CharSequence,CharSequence) in StringUtils has been deprecated
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/AnalysisSummary.java#L53
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/InfoView.java#L25
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/InfoView.java#L26
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/DashboardTable.java#L42
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesColumnConfiguration.java#L17
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesColumnConfiguration.java#L18
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesColumnConfiguration.java#L19
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesColumnConfiguration.java#L20
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L28
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L30
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L31
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L32
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L33
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L34
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L35
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L36
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L37
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L39
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L40
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L41
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L42
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L43
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L44
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L45
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L46
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L47
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L48
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L49
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L50
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L51
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L26
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L68
[this-escape] previous possible 'this' escape happens here via invocation
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L27
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L29
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L38
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/StaticAnalysisIssuesPerToolAndJobPortlet.java#L16
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/StaticAnalysisIssuesPerToolAndJobPortlet.java#L17
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Java Compiler: compiler:compile:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/WarningsSnippetGenerator.java#L19
[this-escape] possible 'this' escape before subclass is fully initialized
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesTableRow.java#L50
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/AbstractSeverityTableRow.java#L67
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/BaseIssuesTableRow.java#L103
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/SourceView.java#L60
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/DryTableRow.java#L80
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/BlamesTableRow.java#L69
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesColumn.java#L139
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L80
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L278
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L292
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L306
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L323
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L338
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L340
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L356
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L371
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L386
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L400
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L414
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L429
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L443
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L457
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L471
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L485
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L499
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L517
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L537
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L552
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L553
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L572
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L575
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L593
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: Varifier:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L595
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L695
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L708
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L722
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L736
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L750
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L764
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L778
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L792
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: CanIgnoreReturnValueSuggester:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L806
Methods that always return 'this' (or return an input parameter) should be annotated with @com.google.errorprone.annotations.CanIgnoreReturnValue.
|
|
Error Prone: EffectivelyPrivate:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L840
This declaration has public or protected modifiers, but is effectively private.
|
|
Error Prone: EffectivelyPrivate:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L844
This declaration has public or protected modifiers, but is effectively private.
|
|
Error Prone: EffectivelyPrivate:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L848
This declaration has public or protected modifiers, but is effectively private.
|
|
Error Prone: EffectivelyPrivate:
ui-tests/src/main/java/io/jenkins/plugins/analysis/warnings/IssuesRecorder.java#L863
This declaration has public or protected modifiers, but is effectively private.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L37
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L59
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L80
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L102
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L132
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L164
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DashboardViewPortletUiTest.java#L192
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L70
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L140
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L201
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L220
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L244
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L342
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L435
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: StringConcatToTextBlock:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/UiTest.java#L441
This string literal can be written more clearly as a text block.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L47
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L70
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L98
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L124
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L177
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L199
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L234
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L267
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/DetailsTabUiTest.java#L305
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L145
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L185
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: StringConcatToTextBlock:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L202
This string literal can be written more clearly as a text block.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L217
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L238
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L279
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: StringConcatToTextBlock:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L297
This string literal can be written more clearly as a text block.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L311
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: StringConcatToTextBlock:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L336
This string literal can be written more clearly as a text block.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L351
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GitForensicsUiTest.java#L363
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GlobalConfigurationUiTest.java#L63
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GlobalConfigurationUiTest.java#L94
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/GlobalConfigurationUiTest.java#L111
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/IssuesColumnUiTest.java#L36
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/IssuesColumnUiTest.java#L47
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/IssuesColumnUiTest.java#L57
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/IssuesColumnUiTest.java#L81
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: UnusedVariable:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L26
The field 'FINDBUGS_ICON' is never read.
|
|
Error Prone: UnusedVariable:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L28
The field 'DRY_ICON' is never read.
|
|
Error Prone: UnusedVariable:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L25
The field 'CHECKSTYLE_ICON' is never read.
|
|
Error Prone: UnusedVariable:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L29
The field 'PMD_ICON' is never read.
|
|
Error Prone: UnusedVariable:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L27
The field 'ANALYSIS_ICON' is never read.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L127
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SmokeTests.java#L170
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/SnippetGeneratorUiTest.java#L155
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/TrendChartsUiTest.java#L37
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/TrendChartsUiTest.java#L93
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/WarningsPluginUiTest.java#L100
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/WarningsPluginUiTest.java#L157
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/WarningsPluginUiTest.java#L172
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/WarningsPluginUiTest.java#L206
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/WarningsPluginUiTest.java#L237
Consider using `var` here to avoid boilerplate.
|
|
Error Prone: Varifier:
ui-tests/src/test/java/io/jenkins/plugins/analysis/warnings/WarningsPluginUiTest.java#L274
Consider using `var` here to avoid boilerplate.
|
|
OWASP Dependency Check: CVE-2025-58458:
apache-httpcomponents-client-4-api-4.5.14-269.vfa_2321039a_83.jar#L1
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
|
|
OWASP Dependency Check: CVE-2025-58458:
apache-httpcomponents-client-5-api-5.5-170.v023de017ccd7.jar#L1
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
|
|
OWASP Dependency Check: CVE-2020-36843:
cli-2.516.3.jar (shaded: net.i2p.crypto:eddsa:0.3.0)#L1
The implementation of EdDSA in EdDSA-Java (aka ed25519-java) through 0.3.0 exhibits signature malleability and does not satisfy the SUF-CMA (Strong Existential Unforgeability under Chosen Message Attacks) property. This allows attackers to create new valid signatures different from previous signatures for a known message.
|
|
OWASP Dependency Check: CVE-2018-1000052:
commons-jelly-tags-fmt-1.1-jenkins-20250616.jar#L1
fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7.
|
|
OWASP Dependency Check: CVE-2025-48924:
commons-lang-2.6.jar#L1
Uncontrolled Recursion vulnerability in Apache Commons Lang.
This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0.
The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a
StackOverflowError could cause an application to stop.
Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-48924 for details
|
|
OWASP Dependency Check: CVE-2016-9299:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
|
|
OWASP Dependency Check: CVE-2017-1000353:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
|
|
OWASP Dependency Check: CVE-2018-1000861:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
|
|
OWASP Dependency Check: CVE-2021-21690:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
|
|
OWASP Dependency Check: CVE-2021-21691:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
|
|
OWASP Dependency Check: CVE-2021-21692:
jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
|
|
OWASP Dependency Check: CVE-2021-21693:
jenkins-core-2.516.3.jar: jenkins.exe#L1
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
|
|
OWASP Dependency Check: CVE-2021-21694:
jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
|
|
OWASP Dependency Check: CVE-2021-21696:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
|
|
OWASP Dependency Check: CVE-2024-23897:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
|
|
OWASP Dependency Check: CVE-2021-21685:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
|
|
OWASP Dependency Check: CVE-2021-21687:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
|
|
OWASP Dependency Check: CVE-2021-21689:
jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
|
|
OWASP Dependency Check: CVE-2021-21697:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
|
|
OWASP Dependency Check: CVE-2017-1000354:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.
|
|
OWASP Dependency Check: CVE-2017-1000356:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts.
|
|
OWASP Dependency Check: CVE-2017-1000393:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of this launch method now requires the Run Scripts permission typically only granted to administrators.
|
|
OWASP Dependency Check: CVE-2017-2608:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
|
|
OWASP Dependency Check: CVE-2018-1999001:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
|
|
OWASP Dependency Check: CVE-2019-10384:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.
|
|
OWASP Dependency Check: CVE-2020-2160:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.
|
|
OWASP Dependency Check: CVE-2021-21695:
jenkins-core-2.516.3.jar: jenkins.exe#L1
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
|
|
OWASP Dependency Check: CVE-2023-43496:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
|
|
OWASP Dependency Check: CVE-2024-43044:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
|
|
OWASP Dependency Check: CVE-2020-2099:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
|
|
OWASP Dependency Check: CVE-2018-1000863:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
|
|
OWASP Dependency Check: CVE-2017-1000504:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A race condition during Jenkins 2.94 and earlier; 2.89.1 and earlier startup could result in the wrong order of execution of commands during initialization. There is a very short window of time after startup during which Jenkins may no longer show the 'Please wait while Jenkins is getting ready to work' message but Cross-Site Request Forgery (CSRF) protection may not yet be effective.
|
|
OWASP Dependency Check: CVE-2018-1000194:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
|
|
OWASP Dependency Check: CVE-2019-1003049:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.
|
|
OWASP Dependency Check: CVE-2021-21686:
jenkins-core-2.516.3.jar: jenkins.exe#L1
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
|
|
OWASP Dependency Check: CVE-2023-43497:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
|
|
OWASP Dependency Check: CVE-2023-43498:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
|
|
OWASP Dependency Check: CVE-2021-21604:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.
|
|
OWASP Dependency Check: CVE-2021-21605:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.
|
|
OWASP Dependency Check: CVE-2023-35141:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
|
|
OWASP Dependency Check: CVE-2018-1000410:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An information exposure vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier, and the Stapler framework used by these releases, in core/src/main/java/org/kohsuke/stapler/RequestImpl.java, core/src/main/java/hudson/model/Descriptor.java that allows attackers with Overall/Administer permission or access to the local file system to obtain credentials entered by users if the form submission could not be successfully processed.
|
|
OWASP Dependency Check: CVE-2017-1000394:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-fileupload library with the denial-of-service vulnerability known as CVE-2016-3092. The fix for that vulnerability has been backported to the version of the library bundled with Jenkins.
|
|
OWASP Dependency Check: CVE-2018-1999002:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
|
|
OWASP Dependency Check: CVE-2018-1999043:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in BasicAuthenticationFilter.java, BasicHeaderApiTokenAuthenticator.java that allows attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials.
|
|
OWASP Dependency Check: CVE-2019-10353:
jenkins-core-2.516.3.jar: jenkins.exe#L1
CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.
|
|
OWASP Dependency Check: CVE-2021-21688:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
|
|
OWASP Dependency Check: CVE-2021-28165:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
|
|
OWASP Dependency Check: CVE-2021-43859:
jenkins-core-2.516.3.jar: jenkins.exe#L1
XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.
|
|
OWASP Dependency Check: CVE-2022-0538:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.
|
|
OWASP Dependency Check: CVE-2022-2048:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
|
|
OWASP Dependency Check: CVE-2022-34174:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.
|
|
OWASP Dependency Check: CVE-2023-27900:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service.
|
|
OWASP Dependency Check: CVE-2023-27901:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
|
|
OWASP Dependency Check: CVE-2023-36478:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to
exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295
will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
|
|
OWASP Dependency Check: CVE-2023-44487:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
|
|
OWASP Dependency Check: CVE-2017-1000391:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulting in problems like overwriting of unrelated configuration files.
|
|
OWASP Dependency Check: CVE-2019-1003003:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java that allows attackers with Overall/RunScripts permission to craft Remember Me cookies that would never expire, allowing e.g. to persist access to temporarily compromised user accounts.
|
|
OWASP Dependency Check: CVE-2019-1003004:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time.
|
|
OWASP Dependency Check: CVE-2023-27899:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.
|
|
OWASP Dependency Check: CVE-2017-1000355:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void.
|
|
OWASP Dependency Check: CVE-2018-1000406:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
|
|
OWASP Dependency Check: CVE-2018-1000408:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that allows attackers without Overall/Read permission to access a specific URL on instances using the built-in Jenkins user database security realm that results in the creation of an ephemeral user record in memory.
|
|
OWASP Dependency Check: CVE-2018-1000864:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
|
|
OWASP Dependency Check: CVE-2018-1000997:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
|
|
OWASP Dependency Check: CVE-2018-1999044:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
|
|
OWASP Dependency Check: CVE-2018-1999047:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A improper authorization vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in UpdateCenter.java that allows attackers to cancel a Jenkins restart scheduled through the update center.
|
|
OWASP Dependency Check: CVE-2018-6356:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.
|
|
OWASP Dependency Check: CVE-2019-10352:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
|
|
OWASP Dependency Check: CVE-2021-21602:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
|
|
OWASP Dependency Check: CVE-2021-21607:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.
|
|
OWASP Dependency Check: CVE-2021-21683:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.
|
|
OWASP Dependency Check: CVE-2024-43045:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
|
|
OWASP Dependency Check: CVE-2018-1000407:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins.
|
|
OWASP Dependency Check: CVE-2021-21610:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering a formatted preview of markup passed as a query parameter, resulting in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup.
|
|
OWASP Dependency Check: CVE-2017-1000396:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. This library is widely used as a transitive dependency in Jenkins plugins. The fix for CVE-2012-6153 was backported to the version of commons-httpclient that is bundled in core and made available to plugins.
|
|
OWASP Dependency Check: CVE-2020-2100:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848.
|
|
OWASP Dependency Check: CVE-2017-2599:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321).
|
|
OWASP Dependency Check: CVE-2017-2601:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in parameter names and descriptions (SECURITY-353). Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions.
|
|
OWASP Dependency Check: CVE-2017-2607:
jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users, or users with SCM access, could configure jobs or modify build scripts such that they print serialized console notes that perform cross-site scripting attacks on Jenkins users viewing the build logs.
|
|
OWASP Dependency Check: CVE-2017-2610:
jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).
|
|
OWASP Dependency Check: CVE-2017-2612:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.
|
|
OWASP Dependency Check: CVE-2017-2613:
jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).
|
|
OWASP Dependency Check: CVE-2018-1000170:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions.
|
|
OWASP Dependency Check: CVE-2018-1000409:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account.
|
|
OWASP Dependency Check: CVE-2018-1999005:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
|
|
OWASP Dependency Check: CVE-2018-1999007:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled.
|
|
OWASP Dependency Check: CVE-2018-1999045:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A improper authentication vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in SecurityRealm.java, TokenBasedRememberMeServices2.java that allows attackers with a valid cookie to remain logged in even if that feature is disabled.
|
|
OWASP Dependency Check: CVE-2019-1003050:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
|
|
OWASP Dependency Check: CVE-2019-10401:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically Job/Configure).
|
|
OWASP Dependency Check: CVE-2019-10402:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.
|
|
OWASP Dependency Check: CVE-2019-10403:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the SCM tag name on the tooltip for SCM tag actions, resulting in a stored XSS vulnerability exploitable by users able to control SCM tag names for these actions.
|
|
OWASP Dependency Check: CVE-2019-10404:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the reason why a queue items is blcoked in tooltips, resulting in a stored XSS vulnerability exploitable by users able to control parts of the reason a queue item is blocked, such as label expressions not matching any idle executors.
|
|
OWASP Dependency Check: CVE-2019-10405:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
|
|
OWASP Dependency Check: CVE-2020-2103:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page.
|
|
OWASP Dependency Check: CVE-2020-2105:
jenkins-core-2.516.3.jar: jenkins.exe#L1
REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks.
|
|
OWASP Dependency Check: CVE-2020-2161:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels.
|
|
OWASP Dependency Check: CVE-2020-2162:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not set Content-Security-Policy headers for files uploaded as file parameters to a build, resulting in a stored XSS vulnerability.
|
|
OWASP Dependency Check: CVE-2020-2163:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier improperly processes HTML content of list view column headers, resulting in a stored XSS vulnerability exploitable by users able to control column headers.
|
|
OWASP Dependency Check: CVE-2020-2220:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the agent name in the build time trend page, resulting in a stored cross-site scripting vulnerability.
|
|
OWASP Dependency Check: CVE-2020-2221:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.
|
|
OWASP Dependency Check: CVE-2020-2222:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the job name in the 'Keep this build forever' badge tooltip, resulting in a stored cross-site scripting vulnerability.
|
|
OWASP Dependency Check: CVE-2020-2223:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability.
|
|
OWASP Dependency Check: CVE-2020-2229:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.
|
|
OWASP Dependency Check: CVE-2020-2230:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.
|
|
OWASP Dependency Check: CVE-2020-2231:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.
|
|
OWASP Dependency Check: CVE-2021-21603:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability.
|
|
OWASP Dependency Check: CVE-2021-21608:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels.
|
|
OWASP Dependency Check: CVE-2021-21611:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.
|
|
OWASP Dependency Check: CVE-2023-39151:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents.
|
|
OWASP Dependency Check: CVE-2023-43495:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
|
|
OWASP Dependency Check: CVE-2025-27624:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).
|
|
OWASP Dependency Check: CVE-2018-1000067:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response.
|
|
OWASP Dependency Check: CVE-2018-1000068:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
|
|
OWASP Dependency Check: CVE-2018-1000169:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An exposure of sensitive information vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in CLICommand.java and ViewOptionHandler.java that allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.
|
|
OWASP Dependency Check: CVE-2018-1999042:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in XStream2.java that allows attackers to have Jenkins resolve a domain name when deserializing an instance of java.net.URL.
|
|
OWASP Dependency Check: CVE-2020-2101:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
|
|
OWASP Dependency Check: CVE-2020-2102:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier used a non-constant time comparison function when validating an HMAC.
|
|
OWASP Dependency Check: CVE-2021-21609:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.
|
|
OWASP Dependency Check: CVE-2021-21615:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
|
|
OWASP Dependency Check: CVE-2023-27904:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.
|
|
OWASP Dependency Check: CVE-2025-59474:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check in the sidepanel of a page intentionally accessible to users lacking Overall/Read permission, allowing attackers without Overall/Read permission to list agent names through its sidepanel executors widget.
|
|
OWASP Dependency Check: CVE-2025-59476:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control log message contents to insert line break characters, followed by forged log messages that may mislead administrators reviewing log output.
|
|
OWASP Dependency Check: CVE-2017-1000392:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters.
|
|
OWASP Dependency Check: CVE-2019-10383:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages.
|
|
OWASP Dependency Check: CVE-2019-10406:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.
|
|
OWASP Dependency Check: CVE-2017-17383:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins through 2.93 allows remote authenticated administrators to conduct XSS attacks via a crafted tool name in a job configuration form, as demonstrated by the JDK tool in Jenkins core and the Ant tool in the Ant plugin, aka SECURITY-624.
|
|
OWASP Dependency Check: CVE-2023-27903:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used.
|
|
OWASP Dependency Check: CVE-2017-1000395:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator.
|
|
OWASP Dependency Check: CVE-2017-1000398:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The remote API in Jenkins 2.73.1 and earlier, 2.83 and earlier at /computer/(agent-name)/api showed information about tasks (typically builds) currently running on that agent. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only shows information about accessible tasks.
|
|
OWASP Dependency Check: CVE-2017-1000399:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API endpoint is now only available for tasks that the current user has access to.
|
|
OWASP Dependency Check: CVE-2017-1000400:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only lists upstream and downstream projects that the current user has access to.
|
|
OWASP Dependency Check: CVE-2017-2598:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).
|
|
OWASP Dependency Check: CVE-2017-2600:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343).
|
|
OWASP Dependency Check: CVE-2017-2602:
jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to an improper blacklisting of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents (SECURITY-358).
|
|
OWASP Dependency Check: CVE-2017-2604:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins before versions 2.44, 2.32.2 low privilege users were able to act on administrative monitors due to them not being consistently protected by permission checks (SECURITY-371).
|
|
OWASP Dependency Check: CVE-2017-2606:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to an information exposure in the internal API that allows access to item names that should not be visible (SECURITY-380). This only affects anonymous users (other users legitimately have access) that were able to get a list of items via an UnprotectedRootAction.
|
|
OWASP Dependency Check: CVE-2017-2609:
jenkins-core-2.516.3.jar: jenkins.exe#L1
jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.
|
|
OWASP Dependency Check: CVE-2017-2611:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.
|
|
OWASP Dependency Check: CVE-2018-1000192:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A information exposure vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in AboutJenkins.java, ListPluginsCommand.java that allows users with Overall/Read access to enumerate all installed plugins.
|
|
OWASP Dependency Check: CVE-2018-1000193:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI.
|
|
OWASP Dependency Check: CVE-2018-1000195:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.
|
|
OWASP Dependency Check: CVE-2018-1000862:
jenkins-core-2.516.3.jar: jenkins.exe#L1
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
|
|
OWASP Dependency Check: CVE-2018-1999003:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds.
|
|
OWASP Dependency Check: CVE-2018-1999004:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in SlaveComputer.java that allows attackers with Overall/Read permission to initiate agent launches, and abort in-progress agent launches.
|
|
OWASP Dependency Check: CVE-2018-1999006:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade.
|
|
OWASP Dependency Check: CVE-2018-1999046:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A exposure of sensitive information vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in Computer.java that allows attackers With Overall/Read permission to access the connection log for any agent.
|
|
OWASP Dependency Check: CVE-2019-10354:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information.
|
|
OWASP Dependency Check: CVE-2020-2104:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier allowed users with Overall/Read access to view a JVM memory usage chart.
|
|
OWASP Dependency Check: CVE-2020-2251:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.
|
|
OWASP Dependency Check: CVE-2021-21606:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.
|
|
OWASP Dependency Check: CVE-2021-21639:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
|
|
OWASP Dependency Check: CVE-2021-21640:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.
|
|
OWASP Dependency Check: CVE-2021-21670:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
|
|
OWASP Dependency Check: CVE-2021-21682:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
|
|
OWASP Dependency Check: CVE-2022-20612:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
|
|
OWASP Dependency Check: CVE-2023-27902:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents.
|
|
OWASP Dependency Check: CVE-2024-47803:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
|
|
OWASP Dependency Check: CVE-2024-47804:
jenkins-core-2.516.3.jar: jenkins.exe#L1
If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.
|
|
OWASP Dependency Check: CVE-2025-27622:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.
|
|
OWASP Dependency Check: CVE-2025-27623:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.
|
|
OWASP Dependency Check: CVE-2025-27625:
jenkins-core-2.516.3.jar: jenkins.exe#L1
In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.
|
|
OWASP Dependency Check: CVE-2025-31720:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent, gaining access to its configuration.
|
|
OWASP Dependency Check: CVE-2025-31721:
jenkins-core-2.516.3.jar: jenkins.exe#L1
A missing permission check in Jenkins 2.503 and earlier, LTS 2.492.2 and earlier allows attackers with Computer/Create permission but without Computer/Configure permission to copy an agent, gaining access to encrypted secrets in its configuration.
|
|
OWASP Dependency Check: CVE-2025-59475:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).
|
|
OWASP Dependency Check: CVE-2017-2603:
jenkins-core-2.516.3.jar: jenkins.exe#L1
Jenkins before versions 2.44, 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362).
|
|
OWASP Dependency Check: CVE-2017-1000401:
jenkins-core-2.516.3.jar: jenkins.exe#L1
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
|
|
OWASP Dependency Check: CVE-2023-52070:
jfreechart-1.0.19.jar#L1
JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification.
|
|
OWASP Dependency Check: CVE-2023-50572:
jline-2.14.6.jar#L1
An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error.
|
|
OWASP Dependency Check: CVE-2015-1809:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.
|
|
OWASP Dependency Check: CVE-2015-1811:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.
|
|
OWASP Dependency Check: CVE-2013-2034:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2012-6073:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2012-0324:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0325.
|
|
OWASP Dependency Check: CVE-2012-0325:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0324.
|
|
OWASP Dependency Check: CVE-2012-6072:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
CRLF injection vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2012-6074:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2013-0158:
remoting-3309.v27b_9314fd1a_4.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.
|
|
OWASP Dependency Check: CVE-2025-41249:
spring-core-6.2.8.jar#L1
The Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.
Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.
You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.
This CVE is published in conjunction with CVE-2025-41248 https://spring.io/security/cve-2025-41248 .
Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-41249 for details
|
|
OWASP Dependency Check: CVE-2025-41242:
spring-core-6.2.8.jar#L1
Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container.
An application can be vulnerable when all the following are true:
* the application is deployed as a WAR or with an embedded Servlet container
* the Servlet container does not reject suspicious sequences https://jakarta.ee/specifications/servlet/6.1/jakarta-servlet-spec-6.1.html#uri-path-canonicalization
* the application serves static resources https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title with Spring resource handling
We have verified that applications deployed on Apache Tomcat or Eclipse Jetty are not vulnerable, as long as default security features are not disabled in the configuration. Because we cannot check exploits against all Servlet containers and configuration variants, we strongly recommend upgrading your application.
Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-41242 for details
|
|
OWASP Dependency Check: CVE-2025-41248:
spring-security-core-6.5.1.jar#L1
The Spring Security annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue when using @PreAuthorize and other method security annotations, resulting in an authorization bypass.
Your application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.
You are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.
This CVE is published in conjunction with CVE-2025-41249 https://spring.io/security/cve-2025-41249 .
Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2025-41248 for details
|
|
OWASP Dependency Check: CVE-2020-7760:
stapler-adjunct-codemirror-1.3.jar#L1
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
|
|
OWASP Dependency Check: CVE-2017-10355:
xercesImpl-2.12.2.jar#L1
sonatype-2017-0348 - xerces:xercesImpl - Denial of Service (DoS)
The software contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock.
|
|
OWASP Dependency Check: CVE-2023-40743:
axis-1.4.jar#L1
** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.
As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
|
|
OWASP Dependency Check: CVE-2019-0227:
axis-1.4.jar#L1
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
|
|
OWASP Dependency Check: CVE-2018-8032:
axis-1.4.jar#L1
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
|
|
OWASP Dependency Check: CVE-2012-5784:
axis-1.4.jar#L1
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
|
OWASP Dependency Check: CVE-2014-3596:
axis-1.4.jar#L1
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
|
|
OWASP Dependency Check: CVE-2007-2353:
axis-1.4.jar#L1
Apache Axis 1.0 allows remote attackers to obtain sensitive information by requesting a non-existent WSDL file, which reveals the installation path in the resulting exception message.
|
|
OWASP Dependency Check: CVE-2025-8916:
bcpkix-jdk15on-1.64.jar#L1
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java.
This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.
|
|
OWASP Dependency Check: CVE-2023-33202:
bcpkix-jdk15on-1.64.jar#L1
Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. (For users of the FIPS Java API: BC-FJA 1.0.2.3 and earlier are affected; BC-FJA 1.0.2.4 is fixed.)
|
|
OWASP Dependency Check: CVE-2024-34447:
bcprov-jdk15on-1.64.jar#L1
bouncycastle - Improper Validation of Certificate with Host Mismatch
The software communicates with a host that provides a certificate, but the software does not properly ensure that the certificate is actually associated with that host.
|
|
OWASP Dependency Check: CVE-2024-29857:
bcprov-jdk15on-1.64.jar#L1
An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
|
|
OWASP Dependency Check: CVE-2024-30171:
bcprov-jdk15on-1.64.jar#L1
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
|
|
OWASP Dependency Check: CVE-2020-15522:
bcprov-jdk15on-1.64.jar#L1
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
|
|
OWASP Dependency Check: CVE-2020-0187:
bcprov-jdk15on-1.64.jar#L1
In engineSetMode of BaseBlockCipher.java, there is a possible incorrect cryptographic algorithm chosen due to an incomplete comparison. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148517383
|
|
OWASP Dependency Check: CVE-2023-33202:
bcprov-jdk15on-1.64.jar#L1
Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. (For users of the FIPS Java API: BC-FJA 1.0.2.3 and earlier are affected; BC-FJA 1.0.2.4 is fixed.)
|
|
OWASP Dependency Check: CVE-2023-33201:
bcprov-jdk15on-1.64.jar#L1
Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
|
|
OWASP Dependency Check: CVE-2024-25638:
dnsjava-3.1.0.jar#L1
dnsjava is an implementation of DNS in Java. Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones. This vulnerability is fixed in 3.6.0.
|
|
OWASP Dependency Check: CVE-2019-16541:
jira-api-1.3.jar#L1
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.
|
|
OWASP Dependency Check: CVE-2018-1000412:
jira-api-1.3.jar#L1
An improper authorization vulnerability exists in Jenkins Jira Plugin 3.0.1 and earlier in JiraSite.java that allows attackers with Overall/Read access to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
|
OWASP Dependency Check: CVE-2023-49673:
jira-api-1.3.jar#L1
A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.
|
|
OWASP Dependency Check: CVE-2023-49653:
jira-api-1.3.jar#L1
Jenkins Jira Plugin 3.11 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
|
|
OWASP Dependency Check: CVE-2022-29041:
jira-api-1.3.jar#L1
Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
|
OWASP Dependency Check: CVE-2015-1809:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.
|
|
OWASP Dependency Check: CVE-2015-1811:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.
|
|
OWASP Dependency Check: CVE-2013-2034:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2012-6073:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2012-0324:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0325.
|
|
OWASP Dependency Check: CVE-2012-0325:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0324.
|
|
OWASP Dependency Check: CVE-2012-6072:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
CRLF injection vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2012-6074:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.
|
|
OWASP Dependency Check: CVE-2013-0158:
remoting-3345.v03dee9b_f88fc.jar (shaded: org.jenkins-ci:constant-pool-scanner:1.2)#L1
Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/portlets/IssuesChartPortlet.java#L37
Lines 37-154 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/portlets/IssuesTablePortlet.java#L200
Line 200 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/portlets/IssuesTablePortlet.java#L260
Lines 260-264 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/portlets/PullRequestMonitoringPortlet.java#L65
Lines 65-75 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/portlets/PullRequestMonitoringPortlet.java#L176
Lines 176-195 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/portlets/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/portlets/Messages.java#L47
Lines 47-69 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/portlets/Messages.java#L91
Line 91 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/AnalysisStepDescriptor.java#L37
Lines 37-216 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L177
Line 177 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L210
Lines 210-211 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L226
Line 226 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L329
Lines 329-330 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L348
Lines 348-349 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L360
Lines 360-361 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L127
Lines 127-128 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L221
Line 221 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L265
Lines 265-272 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L276
Line 276 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L313
Line 313 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L329
Lines 329-343 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L425
Lines 425-426 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L439
Lines 439-440 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L453
Lines 453-454 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L480
Lines 480-493 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L508
Lines 508-523 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L560
Lines 560-561 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L575
Lines 575-576 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L592
Lines 592-593 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L97
Line 97 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L105
Line 105 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L167
Lines 167-185 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L203
Lines 203-204 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L218
Lines 218-230 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L245
Lines 245-273 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L290
Lines 290-291 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L310
Lines 310-311 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L325
Lines 325-326 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L340
Lines 340-346 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L365
Lines 365-366 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L427
Line 427 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/WarningChecksPublisher.java#L66
Lines 66-71 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/WarningChecksPublisher.java#L133
Line 133 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/WarningChecksPublisher.java#L172
Line 172 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L95
Lines 95-96 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L111
Lines 111-112 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L129
Lines 129-154 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L168
Lines 168-169 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L184
Lines 184-198 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L218
Lines 218-219 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L52
Line 52 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L68
Lines 68-87 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L103
Line 103 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L123
Lines 123-126 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L137
Line 137 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L168
Lines 168-182 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L188
Line 188 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L283
Line 283 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/ToolProxy.java#L46
Line 46 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L157
Line 157 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L160
Line 160 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L163
Line 163 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L166
Line 166 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L169
Line 169 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L172
Line 172 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L175
Line 175 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L178
Line 178 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L196
Line 196 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L286
Line 286 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L411
Line 411 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L440
Lines 440-446 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L483
Line 483 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L520
Line 520 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L648
Line 648 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L675
Line 675 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L693
Line 693 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L751
Line 751 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L813
Line 813 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L848
Lines 848-856 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L867
Lines 867-1038 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/Messages.java#L36
Lines 36-95 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/Messages.java#L117
Lines 117-179 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/steps/Messages.java#L199
Line 199 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/Messages.java#L219
Lines 219-283 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/Messages.java#L305
Lines 305-325 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/steps/Messages.java#L347
Lines 347-395 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/FileFinder.java#L84
Line 84 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/FileFinder.java#L108
Line 108 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/WarningsQualityGate.java#L69
Lines 69-70 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/WarningsQualityGate.java#L111
Lines 111-125 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/WarningsQualityGate.java#L206
Lines 206-214 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/WarningsQualityGate.java#L231
Line 231 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/ConsoleLogReaderFactory.java#L64
Lines 64-65 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/ModelValidation.java#L42
Line 42 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/ModelValidation.java#L164
Line 164 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/BuildFolderFacade.java#L38
Line 38 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L71
Line 71 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L76
Lines 76-77 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L98
Line 98 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L233
Lines 233-234 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L271
Lines 271-272 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L45
Lines 45-55 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L85
Lines 85-95 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L115
Line 115 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L136
Lines 136-157 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L178
Line 178 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L199
Line 199 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L231
Lines 231-241 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L271
Line 271 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L293
Lines 293-323 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L353
Lines 353-363 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L383
Line 383 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L413
Line 413 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L433
Line 433 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L453
Lines 453-473 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L495
Lines 495-505 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L528
Lines 528-551 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L583
Line 583 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L605
Lines 605-615 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L645
Line 645 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L669
Lines 669-680 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L701
Line 701 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L721
Line 721 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L751
Lines 751-761 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L784
Lines 784-797 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L817
Line 817 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L837
Lines 837-848 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L885
Line 885 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/Messages.java#L907
Line 907 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L927
Lines 927-957 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/Messages.java#L977
Lines 977-1009 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/util/IssuesStatistics.java#L223
Line 223 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/util/IssuesStatistics.java#L251
Lines 251-277 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/tasks/OpenTasks.java#L122
Lines 122-158 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/tasks/OpenTasks.java#L172
Lines 172-178 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/tasks/OpenTasks.java#L198
Lines 198-203 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/tasks/OpenTasks.java#L243
Lines 243-328 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/tasks/AgentScanner.java#L94
Line 94 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/tasks/AgentScanner.java#L121
Lines 121-165 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L93
Line 93 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L96
Line 96 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L47
Line 47 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L67
Line 67 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L87
Line 87 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L107
Line 107 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L127
Line 127 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L147
Line 147 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L173
Line 173 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L193
Line 193 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L213
Line 213 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L233
Line 233 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L253
Line 253 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L273
Line 273 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L293
Line 293 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/Messages.java#L313
Line 313 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/filter/RegexpFilter.java#L98
Line 98 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/tokens/IssuesSizeTokenMacro.java#L52
Line 52 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L17
Lines 17-18 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L260
Line 260 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L263
Line 263 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L86
Lines 86-106 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L142
Lines 142-143 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L162
Lines 162-163 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L171
Lines 171-172 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L191
Lines 191-251 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/AxivionSuite.java#L273
Lines 273-414 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/axivion/RemoteAxivionDashboard.java#L42
Lines 42-93 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/RevApi.java#L70
Line 70 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/RevApi.java#L95
Line 95 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/RevApi.java#L168
Line 168 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/RevApi.java#L201
Lines 201-206 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/IdeaInspection.java#L51
Line 51 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L119
Line 119 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L129
Line 129 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L151
Lines 151-156 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L196
Lines 196-221 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L338
Line 338 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L348
Line 348 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/ProtoLint.java#L40
Line 40 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/WarningsPlugin.java#L46
Lines 46-48 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/JsLint.java#L25
Lines 25-27 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/JsLint.java#L40
Lines 40-45 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L40
Lines 40-75 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L95
Lines 95-115 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L135
Lines 135-155 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L175
Line 175 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L199
Line 199 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L219
Line 219 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L239
Lines 239-261 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L281
Line 281 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L301
Line 301 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L325
Lines 325-349 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L369
Lines 369-389 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L409
Line 409 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L429
Lines 429-449 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L469
Line 469 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/Messages.java#L489
Lines 489-555 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/Messages.java#L579
Line 579 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/JUnit.java#L41
Line 41 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L78
Line 78 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L276
Lines 276-293 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L342
Line 342 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L345
Line 345 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L356
Lines 356-365 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/columns/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/columns/Messages.java#L45
Line 45 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/columns/Messages.java#L67
Line 67 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/charts/SeverityTrendChart.java#L44
Lines 44-47 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/charts/Messages.java#L45
Lines 45-85 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L105
Line 105 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/charts/Messages.java#L125
Lines 125-145 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L165
Line 165 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L185
Line 185 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L205
Line 205 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L225
Line 225 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L245
Line 245 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/Messages.java#L265
Line 265 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/charts/SeverityPalette.java#L34
Line 34 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/charts/ModifiedCodePieChart.java#L14
Lines 14-31 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L158
Line 158 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L164
Line 164 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L171
Lines 171-173 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L258
Lines 258-281 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L304
Lines 304-308 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L340
Lines 340-346 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L385
Lines 385-391 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L400
Lines 400-404 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L450
Lines 450-452 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L36
Lines 36-47 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L71
Line 71 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L97
Line 97 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L121
Lines 121-149 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L175
Line 175 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L201
Line 201 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L223
Line 223 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L249
Line 249 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L271
Line 271 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L293
Lines 293-319 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L345
Line 345 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L371
Line 371 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L397
Line 397 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L423
Line 423 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L445
Line 445 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L467
Lines 467-489 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/Messages.java#L511
Line 511 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/DynamicDocumentParser.java#L53
Line 53 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyScript.java#L53
Line 53 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyScript.java#L63
Line 63 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/GroovyScript.java#L117
Lines 117-124 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L64
Lines 64-65 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L101
Line 101 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L173
Line 173 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L192
Line 192 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L219
Lines 219-223 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/TabLabelProvider.java#L28
Lines 28-68 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/TabLabelProvider.java#L76
Lines 76-84 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ForensicsModel.java#L46
Lines 46-47 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ForensicsModel.java#L60
Line 60 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ForensicsModel.java#L186
Line 186 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ForensicsModel.java#L194
Line 194 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/DetailsTableModel.java#L75
Lines 75-77 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/DetailsTableModel.java#L295
Line 295 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L105
Line 105 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L241
Line 241 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L270
Line 270 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L273
Line 273 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L202
Lines 202-212 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L251
Lines 251-419 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L472
Lines 472-533 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L548
Line 548 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L551
Lines 551-552 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L584
Lines 584-612 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L636
Lines 636-643 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisHistory.java#L71
Line 71 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisHistory.java#L107
Line 107 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisHistory.java#L155
Line 155 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L168
Lines 168-170 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L173
Lines 173-175 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L207
Lines 207-211 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L246
Line 246 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L135
Line 135 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L184
Lines 184-185 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L212
Lines 212-216 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L282
Lines 282-305 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L322
Line 322 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/IssuesModel.java#L47
Line 47 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Tool.java#L162
Line 162 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Tool.java#L224
Lines 224-228 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Tool.java#L259
Line 259 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Tool.java#L272
Lines 272-291 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ConsoleDetail.java#L74
Lines 74-84 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ToolSelection.java#L59
Line 59 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ToolSelection.java#L144
Lines 144-150 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/JobAction.java#L57
Lines 57-78 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/JobAction.java#L208
Lines 208-228 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/JobAction.java#L265
Line 265 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AnalysisModelParser.java#L115
Lines 115-120 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L20
Line 20 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L35
Lines 35-45 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L65
Lines 65-163 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L183
Line 183 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L203
Lines 203-223 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L243
Line 243 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L263
Lines 263-303 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L323
Line 323 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L343
Line 343 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L371
Line 371 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L391
Line 391 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L411
Lines 411-435 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L455
Line 455 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L475
Line 475 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L495
Line 495 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L515
Lines 515-595 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L621
Line 621 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L641
Line 641 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L661
Line 661 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L681
Lines 681-701 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L721
Lines 721-743 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L763
Lines 763-863 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L883
Lines 883-903 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L923
Line 923 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L943
Line 943 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L963
Line 963 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L983
Line 983 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L1007
Lines 1007-1027 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L1047
Line 1047 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L1067
Lines 1067-1087 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L1107
Lines 1107-1191 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L1215
Line 1215 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L1269
Lines 1269-1299 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/Messages.java#L1319
Lines 1319-1359 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L1379
Line 1379 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L1399
Line 1399 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/Messages.java#L1419
Line 1419 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/SummaryModel.java#L47
Lines 47-48 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/SummaryModel.java#L113
Lines 113-121 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/SummaryModel.java#L189
Lines 189-195 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L100
Lines 100-106 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L121
Lines 121-130 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L148
Line 148 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L159
Lines 159-160 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L179
Line 179 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L201
Line 201 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L223
Line 223 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L229
Lines 229-266 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L286
Line 286 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L350
Lines 350-372 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L387
Line 387 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L408
Lines 408-423 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L443
Line 443 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/BlamesModel.java#L45
Lines 45-46 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/BlamesModel.java#L60
Line 60 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L51
Lines 51-56 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L67
Line 67 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L90
Lines 90-98 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L106
Line 106 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L122
Lines 122-158 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L279
Lines 279-288 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L300
Line 300 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L322
Line 322 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L521
Line 521 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L577
Line 577 is not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L616
Line 616 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L676
Lines 676-712 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L722
Lines 722-726 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResetQualityGateCommand.java#L46
Lines 46-49 are not covered by tests
|
|
Not covered line:
io/jenkins/plugins/analysis/core/model/ResetQualityGateCommand.java#L65
Line 65 is not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/IssueReportScanner.java#L66
Lines 66-67 are not covered by tests
|
|
Not covered lines:
io/jenkins/plugins/analysis/core/model/ResetReferenceAction.java#L33
Lines 33-45 are not covered by tests
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/portlets/IssuesTablePortlet.java#L199
Line 199 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L176
Line 176 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesScanner.java#L223
Line 223 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/RecordIssuesStep.java#L275
Line 275 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L96
Line 96 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L426
Line 426 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L451
Line 451 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/PublishIssuesStep.java#L462
Line 462 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/WarningChecksPublisher.java#L132
Line 132 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/WarningChecksPublisher.java#L171
Line 171 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/WarningChecksPublisher.java#L286
Line 286 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L277
Line 277 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/ScanForIssuesStep.java#L278
Line 278 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L51
Line 51 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L102
Line 102 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/AnalysisExecution.java#L119
Line 119 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L103
Line 103 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L160
Line 160 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L167
Line 167 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L242
Line 242 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L259
Line 259 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L266
Line 266 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesPublisher.java#L282
Line 282 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L156
Line 156 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L159
Line 159 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L162
Line 162 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L165
Line 165 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L168
Line 168 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L171
Line 171 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L174
Line 174 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L177
Line 177 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L647
Line 647 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L674
Line 674 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L692
Line 692 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L717
Line 717 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L733
Line 733 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L734
Line 734 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L747
Line 747 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L812
Line 812 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/steps/IssuesRecorder.java#L821
Line 821 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/FileFinder.java#L107
Line 107 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/WarningsQualityGate.java#L230
Line 230 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/ModelValidation.java#L145
Line 145 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/ModelValidation.java#L163
Line 163 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L47
Line 47 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/AffectedFilesResolver.java#L70
Line 70 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/util/IssuesStatistics.java#L248
Line 248 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/OpenTasks.java#L165
Line 165 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/OpenTasks.java#L166
Line 166 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/AgentScanner.java#L93
Line 93 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L92
Line 92 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L95
Line 95 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L149
Line 149 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L206
Line 206 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/tasks/TaskScanner.java#L257
Line 257 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/filter/RegexpFilter.java#L97
Line 97 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L258
Line 258 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L259
Line 259 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L262
Line 262 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L290
Line 290 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L295
Line 295 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/DefaultTransformations.java#L299
Line 299 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/AxivionParser.java#L39
Line 39 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/AxivionParser.java#L49
Line 49 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/axivion/AxRawIssue.java#L47
Line 47 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/RevApi.java#L159
Line 159 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L115
Line 115 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L144
Line 144 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L300
Line 300 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java#L347
Line 347 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L77
Line 77 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L341
Line 341 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L344
Line 344 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L348
Line 348 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L349
Line 349 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L350
Line 350 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/columns/IssuesTotalColumn.java#L351
Line 351 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/charts/SeverityPalette.java#L31
Line 31 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyExpressionMatcher.java#L98
Line 98 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L157
Line 157 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L163
Line 163 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L395
Line 395 is only partially covered, 3 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L397
Line 397 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java#L440
Line 440 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/DynamicDocumentParser.java#L52
Line 52 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L96
Line 96 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/warnings/groovy/ParserConfiguration.java#L187
Line 187 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/TabLabelProvider.java#L106
Line 106 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L103
Line 103 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L269
Line 269 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L272
Line 272 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/StaticAnalysisLabelProvider.java#L352
Line 352 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L248
Line 248 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L547
Line 547 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/IssuesDetail.java#L550
Line 550 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AnalysisHistory.java#L144
Line 144 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AnalysisHistory.java#L150
Line 150 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L167
Line 167 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L172
Line 172 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/DetailFactory.java#L245
Line 245 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L321
Line 321 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/ReportScanningTool.java#L326
Line 326 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/Tool.java#L161
Line 161 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/Tool.java#L253
Line 253 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/Tool.java#L255
Line 255 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/FixedWarningsDetail.java#L58
Line 58 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/ReportXmlStream.java#L99
Line 99 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/SummaryModel.java#L174
Line 174 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L222
Line 222 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L225
Line 225 is only partially covered, 2 branches are missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/ResultAction.java#L328
Line 328 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L66
Line 66 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AggregatedTrendAction.java#L105
Line 105 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/MissingResultFallbackHandler.java#L40
Line 40 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L265
Line 265 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L299
Line 299 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L321
Line 321 is only partially covered, one branch is missing
|
|
Partially covered line:
io/jenkins/plugins/analysis/core/model/AnalysisResult.java#L520
Line 520 is only partially covered, one branch is missing
|