Логотип exploitDog
bind:CVE-2023-32981
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32981

Количество 3

Количество 3

redhat логотип

CVE-2023-32981

больше 2 лет назад

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2023-32981

больше 2 лет назад

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-6987-xccv-fhjp

больше 2 лет назад

Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-32981

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

CVSS3: 6.3
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-32981

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

CVSS3: 8.8
1%
Низкий
больше 2 лет назад
github логотип
GHSA-6987-xccv-fhjp

Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability

CVSS3: 6.3
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу