Логотип exploitDog
bind:CVE-2019-10399
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10399

Количество 3

Количество 3

redhat логотип

CVE-2019-10399

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
EPSS: Низкий
nvd логотип

CVE-2019-10399

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-m26f-w3h5-62fj

больше 3 лет назад

Sandbox bypass vulnerability in Jenkins Script Security Plugin

CVSS3: 4.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-10399

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-10399

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
0%
Низкий
больше 6 лет назад
github логотип
GHSA-m26f-w3h5-62fj

Sandbox bypass vulnerability in Jenkins Script Security Plugin

CVSS3: 4.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу