Логотип exploitDog
bind:CVE-2019-10393
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10393

Количество 3

Количество 3

redhat логотип

CVE-2019-10393

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
EPSS: Низкий
nvd логотип

CVE-2019-10393

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-9fp8-64xf-w957

больше 3 лет назад

Sandbox bypass vulnerability in Script Security Plugin

CVSS3: 4.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-10393

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-10393

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
0%
Низкий
больше 6 лет назад
github логотип
GHSA-9fp8-64xf-w957

Sandbox bypass vulnerability in Script Security Plugin

CVSS3: 4.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу