Jenkins commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit Update

Jenkins is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. This update adds proper CVE number, support for Jenkins with HTTPS enabled, and DNS channel support. It also extends on the supported platforms, improves IPv6 functionality and removes redundant code.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Tuesday, January 19, 2016 - 00:00