Логотип exploitDog
bind:CVE-2018-1000056
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1000056

Количество 3

Количество 3

redhat логотип

CVE-2018-1000056

около 8 лет назад

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2018-1000056

почти 8 лет назад

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVSS3: 8.3
EPSS: Низкий
github логотип

GHSA-4rj6-9pjh-882r

больше 3 лет назад

Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin

CVSS3: 8.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2018-1000056

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVSS3: 7.1
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2018-1000056

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVSS3: 8.3
0%
Низкий
почти 8 лет назад
github логотип
GHSA-4rj6-9pjh-882r

Improper Restriction of XML External Entity Reference in Jenkins JUnit Plugin

CVSS3: 8.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу