Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Jenkins Project | Jenkins | 0 ~ 2.217 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A proof of concept cross-site WebSocket hijacking exploit for CVE-2024-23898 — a vulnerability affecting Jenkins versions 2.217-2.441. For educational use in the Hacking & Offensive Security course at Carnegie Mellon University. | https://github.com/davidmgaviria/CVE2_Jenkins_RCE | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-23905 | Jenkins Plugin Red Hat Dependency Analytics 安全漏洞 | |
| CVE-2024-23903 | Jenkins Plugin GitLab Branch Source 安全漏洞 | |
| CVE-2024-23904 | Jenkins Plugin Log Command 安全漏洞 | |
| CVE-2024-23902 | Jenkins Plugin GitLab Branch Source 安全漏洞 | |
| CVE-2024-23900 | Jenkins Plugin Matrix Project 安全漏洞 | |
| CVE-2024-23901 | Jenkins Plugin GitLab Branch Source 安全漏洞 | |
| CVE-2024-23899 | Jenkins Plugin Git server 安全漏洞 | |
| CVE-2024-23897 | Jenkins 安全漏洞 |
No comments yet