Количество 3
Количество 3
CVE-2018-1000056
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
CVE-2018-1000056
Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
GHSA-4rj6-9pjh-882r
Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-1000056 Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. | CVSS3: 7.1 | 0% Низкий | около 8 лет назад | |
CVE-2018-1000056 Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. | CVSS3: 8.3 | 0% Низкий | почти 8 лет назад | |
GHSA-4rj6-9pjh-882r Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin | CVSS3: 8.3 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу