Lucene search

K

Arbitrary File Read

🗓️ 08 Aug 2024 12:47:25Reported by Veracode Vulnerability DatabaseType 
veracode
 veracode
🔗 sca.analysiscenter.veracode.com👁 18 Views

The software org.jenkins-ci.main, jenkins-core, and org.jenkins-ci.main, remoting is vulnerable to Arbitrary File Read due to missing file path validation, enabling unauthorized file access

Show more
Related
Detection
Refs
Vulners
Node
OR
veracodejenkins_remoting_layerRange3203.v94ce994fdb_313203.v94ce994fdb_31
OR
veracodejenkins_remoting_layerRange3244.vf7f977e047553244.vf7f977e04755
OROR
veracodejenkins_remoting_layerRange3203.v94ce994fdb_313203.v94ce994fdb_31
OR
veracodejenkins_remoting_layerRange3244.vf7f977e047553244.vf7f977e04755

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
08 Aug 2024 12:25Current
6.7Medium risk
Vulners AI Score6.7
CVSS38.8
EPSS0.001
18
.json
Report