Логотип exploitDog
bind:CVE-2023-25762
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25762

Количество 3

Количество 3

redhat логотип

CVE-2023-25762

почти 3 года назад

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

CVSS3: 5.4
EPSS: Средний
nvd логотип

CVE-2023-25762

почти 3 года назад

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

CVSS3: 5.4
EPSS: Средний
github логотип

GHSA-9j65-3f2q-8q2r

почти 3 года назад

Cross-site Scripting in Jenkins Pipeline: Build Step Plugin

CVSS3: 5.4
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-25762

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

CVSS3: 5.4
60%
Средний
почти 3 года назад
nvd логотип
CVE-2023-25762

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

CVSS3: 5.4
60%
Средний
почти 3 года назад
github логотип
GHSA-9j65-3f2q-8q2r

Cross-site Scripting in Jenkins Pipeline: Build Step Plugin

CVSS3: 5.4
60%
Средний
почти 3 года назад

Уязвимостей на страницу