Flaw in Jenkins CLI command parser allows file content replacement
Reporter | Title | Published | Views | Family All 79 |
---|---|---|---|---|
Packet Storm | Jenkins 2.441 / LTS 2.426.3 Arbitrary File Read | 29 Jan 202400:00 | β | packetstorm |
Packet Storm | Jenkins cli Ampersand Replacement Arbitrary File Read | 31 Aug 202400:00 | β | packetstorm |
Packet Storm | Jenkins 2.441 Local File Inclusion | 15 Apr 202400:00 | β | packetstorm |
AttackerKB | CVE-2024-23897 | 24 Jan 202400:00 | β | attackerkb |
Vulnrichment | CVE-2024-23897 | 24 Jan 202417:52 | β | vulnrichment |
GithubExploit | Exploit for Path Traversal in Jenkins | 20 Feb 202415:26 | β | githubexploit |
GithubExploit | Exploit for Path Traversal in Jenkins | 26 Jan 202421:39 | β | githubexploit |
GithubExploit | Exploit for Path Traversal in Jenkins | 16 May 202409:32 | β | githubexploit |
GithubExploit | Exploit for Path Traversal in Jenkins | 26 Jan 202409:44 | β | githubexploit |
GithubExploit | Exploit for Path Traversal in Jenkins | 26 Jan 202419:00 | β | githubexploit |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo