Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Jenkins project | Jenkins | unspecified ~ 2.218 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Jenkins through 2.218, LTS 2.204.1 and earlier, is susceptible to information disclosure. An attacker can access exposed session identifiers on a user detail object in the whoAmI diagnostic page and thus potentially access sensitive information, modify data, and/or execute unauthorized operations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-2103.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-2107 | CloudBees Jenkins Fortify 安全漏洞 | |
| CVE-2020-2108 | CloudBees Jenkins 代码问题漏洞 | |
| CVE-2020-2105 | CloudBees Jenkins 安全漏洞 | |
| CVE-2020-2106 | CloudBees Jenkins Code Coverage API Plugin 跨站脚本漏洞 | |
| CVE-2020-2104 | CloudBees Jenkins 信息泄露漏洞 | |
| CVE-2020-2100 | CloudBees Jenkins 安全漏洞 | |
| CVE-2020-2101 | CloudBees Jenkins 安全漏洞 | |
| CVE-2020-2102 | CloudBees Jenkins 安全漏洞 | |
| CVE-2020-2099 | CloudBees Jenkins 安全特征问题漏洞 |
No comments yet