Логотип exploitDog
bind:CVE-2019-10394
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10394

Количество 3

Количество 3

redhat логотип

CVE-2019-10394

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
EPSS: Низкий
nvd логотип

CVE-2019-10394

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-hvmx-5hv4-f235

больше 3 лет назад

Sandbox bypass vulnerability in Jenkins Script Security Plugin

CVSS3: 4.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-10394

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-10394

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
0%
Низкий
больше 6 лет назад
github логотип
GHSA-hvmx-5hv4-f235

Sandbox bypass vulnerability in Jenkins Script Security Plugin

CVSS3: 4.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу