Логотип exploitDog
bind:CVE-2019-10431
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10431

Количество 3

Количество 3

redhat логотип

CVE-2019-10431

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2019-10431

больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-72gx-qq2m-6xr2

больше 3 лет назад

Improper Control of Generation of Code in Jenkins Script Security Plugin

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-10431

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 8.8
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-10431

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 9.9
0%
Низкий
больше 6 лет назад
github логотип
GHSA-72gx-qq2m-6xr2

Improper Control of Generation of Code in Jenkins Script Security Plugin

CVSS3: 9.9
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу