Known Vulnerabilities for Github by Jenkins

Listed below are 3 of the newest known vulnerabilities associated with "Github" by "Jenkins".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-34456 Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version ... Not Provided 2026-04-01 2026-04-01
CVE-2026-34243 wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 an... Not Provided 2026-03-31 2026-03-31
CVE-2026-34206 Captcha Protect is a Traefik middleware to add an anti-bot challenge to individual IPs in a subnet when traffic spikes are de... Not Provided 2026-03-31 2026-04-01
CVE-2026-34042 act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache serv... Not Provided 2026-03-31 2026-03-31
CVE-2026-34041 act is a project which allows for local running of github actions. Prior to version 0.2.86, act unconditionally processes the... Not Provided 2026-03-31 2026-04-02
CVE-2026-33634 Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.6... Not Provided 2026-03-23 2026-03-30
CVE-2026-33287 LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_fi... Not Provided 2026-03-26 2026-03-26
CVE-2026-33285 LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `mem... Not Provided 2026-03-26 2026-03-28
CVE-2026-31945 LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side reque... Not Provided 2026-03-27 2026-03-30
CVE-2026-29872 A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877... Not Provided 2026-03-30 2026-03-30

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationJenkinsGithub1.9.1AllAllAll
ApplicationJenkinsGithub1.9AllAllAll
ApplicationJenkinsGithub1.8AllAllAll
ApplicationJenkinsGithub1.7AllAllAll
ApplicationJenkinsGithub1.6AllAllAll
ApplicationJenkinsGithub1.5AllAllAll
ApplicationJenkinsGithub1.4AllAllAll
ApplicationJenkinsGithub1.3AllAllAll
ApplicationJenkinsGithub1.29.4AllAllAll
ApplicationJenkinsGithub1.29.3AllAllAll
ApplicationJenkinsGithub1.29.2AllAllAll
ApplicationJenkinsGithub1.29.1AllAllAll
ApplicationJenkinsGithub1.29.0AllAllAll
ApplicationJenkinsGithub1.28.1AllAllAll
ApplicationJenkinsGithub1.28.0AllAllAll
ApplicationJenkinsGithub1.27.0AllAllAll
ApplicationJenkinsGithub1.26.2AllAllAll
ApplicationJenkinsGithub1.26.1AllAllAll
ApplicationJenkinsGithub1.26.0AllAllAll
ApplicationJenkinsGithub1.25.1AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report