Jenkins Security Vulnerabilities: What You Need to Know