Логотип exploitDog
bind:CVE-2017-1000096
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-1000096

Количество 3

Количество 3

redhat логотип

CVE-2017-1000096

больше 8 лет назад

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2017-1000096

больше 8 лет назад

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mhwq-4mh7-fv7c

больше 3 лет назад

Arbitrary code execution due to incomplete sandbox protection in Jenkins Pipeline

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2017-1000096

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-1000096

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
github логотип
GHSA-mhwq-4mh7-fv7c

Arbitrary code execution due to incomplete sandbox protection in Jenkins Pipeline

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу