Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-25721

EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-25721

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Veracode Scan Jenkins Plugin before 23.3.19.0, when the "Connect using proxy" option is enabled and configured with proxy credentials and when the Jenkins global system setting debug is enabled and when a scan is configured for remote agent jobs, allows users (with access to view the job log) to discover proxy credentials.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jenkins Plugin Veracode Scan 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jenkins和Jenkins Plugin都是Jenkins开源的产品。Jenkins是一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。Jenkins Plugin是一个应用软件。 Jenkins Plugin Veracode Scan 23.3.19.0 之前版本存在安全漏洞,该漏洞源于当启用Connect using proxy选项并使用代理凭据配置时,攻击者利用该漏洞可以发现代理凭据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-25721

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-25721

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-03-28 · 28 CVEs total

CVE-2023-16767.8 HIGHDriverGenius IOCTL mydrivers64.sys 0x9C402088 memory corruption
CVE-2023-16775.5 MEDIUMDriverGenius IOCTL mydrivers64.sys 0x9c402084 denial of service
CVE-2023-16785.3 MEDIUMDriverGenius IOCTL mydrivers64.sys 0x9C40A0E0 memory corruption
CVE-2023-16795.3 MEDIUMDriverGenius IOCTL mydrivers64.sys 0x9C40A108 memory corruption
CVE-2023-27821Databasir 安全漏洞
CVE-2023-27701MuYuCMS 安全漏洞
CVE-2023-27700MuYuCMS 路径遍历漏洞
CVE-2023-27247Cynet Client Agent 安全漏洞
CVE-2023-27246MK-Auth 代码问题漏洞
CVE-2023-27232TOTOLINK A7100RU 命令注入漏洞
CVE-2023-27231TOTOLINK A7100RU 命令注入漏洞
CVE-2023-27229TOTOLINK A7100RU 命令注入漏洞
CVE-2023-27008ATutor 跨站脚本漏洞
CVE-2023-26923Musescore 缓冲区错误漏洞
CVE-2023-26071MCUBO ICT 安全漏洞
CVE-2023-25722Jenkins Plugin Veracode Scan 安全漏洞
CVE-2023-25262Stimulsoft GmbH Stimulsoft Designer 代码问题漏洞
CVE-2023-25260Stimulsoft 安全漏洞
CVE-2023-24308PDF-XChange Editor 安全漏洞
CVE-2023-24304IrfanView 输入验证错误漏洞

Showing top 20 of 28 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-25721

No comments yet


Leave a comment