Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Jenkins project | Jenkins Gitlab Hook Plugin | unspecified ~ 1.4.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Jenkins Gitlab Hook 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected cross-site scripting vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-2096.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-2091 | CloudBees Jenkins Amazon EC2 Plugin 授权问题漏洞 | |
| CVE-2020-2090 | CloudBees Jenkins Amazon EC2 Plugin 跨站请求伪造漏洞 | |
| CVE-2020-2092 | CloudBees Jenkins Robot Framework Plugin 代码问题漏洞 | |
| CVE-2020-2093 | CloudBees Jenkins Health Advisor by CloudBees Plugin 跨站请求伪造漏洞 | |
| CVE-2020-2094 | CloudBees Jenkins Health Advisor by CloudBees Plugin 授权问题漏洞 | |
| CVE-2020-2095 | CloudBees Jenkins Redgate SQL Change Automation Plugin 安全漏洞 | |
| CVE-2020-2097 | CloudBees Jenkins Sounds Plugin 授权问题漏洞 | |
| CVE-2020-2098 | CloudBees Jenkins Sounds Plugin 跨站请求伪造漏洞 |
No comments yet