Логотип exploitDog
bind:CVE-2017-1000107
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-1000107

Количество 3

Количество 3

redhat логотип

CVE-2017-1000107

больше 8 лет назад

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2017-1000107

больше 8 лет назад

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-h7rx-r733-7x7r

больше 3 лет назад

Sandbox bypass in Jenkins Script Security Plugin sandbox bypass

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2017-1000107

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-1000107

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
github логотип
GHSA-h7rx-r733-7x7r

Sandbox bypass in Jenkins Script Security Plugin sandbox bypass

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу