Логотип exploitDog
bind:CVE-2023-32979
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32979

Количество 3

Количество 3

redhat логотип

CVE-2023-32979

больше 2 лет назад

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-32979

больше 2 лет назад

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-6gp4-2f92-j2w5

больше 2 лет назад

Jenkins Email Extension Plugin missing permission check

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-32979

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-32979

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-6gp4-2f92-j2w5

Jenkins Email Extension Plugin missing permission check

CVSS3: 4.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу