SCM HttpClient Plugin up to 1.5 on Jenkins cross-site request forgery

A vulnerability was found in SCM HttpClient Plugin up to 1.5 on Jenkins (Supply Chain Management Software). It has been rated as problematic. Affected by this issue is an unknown part. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

126

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%36
50%11

Approve Conf

90%36
80%11
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302432909/23/2022VulD...price_0day$0-$5ksee exploit price documentation09/23/2022accepted
90
1302432809/23/2022VulD...cvss3_meta_tempscore6.5see CVSS documentation09/23/2022accepted
90
1302432709/23/2022VulD...cvss3_meta_basescore6.5see CVSS documentation09/23/2022accepted
90
1302432609/23/2022VulD...cvss3_vuldb_tempscore4.3see CVSS documentation09/23/2022accepted
90
1302432509/23/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation09/23/2022accepted
90
1302432409/23/2022VulD...cvss2_vuldb_tempscore5.0see CVSS documentation09/23/2022accepted
90
1302432309/23/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation09/23/2022accepted
90
1302432209/23/2022VulD...cvss3_nvd_basescore8.8nist.gov09/23/2022accepted
90
1302432109/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302432009/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302431909/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302431809/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302431709/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector09/23/2022accepted
80
1302431609/23/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector09/23/2022accepted
80
1302431509/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302431409/23/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector09/23/2022accepted
80
1302431309/23/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector09/23/2022accepted
80
1302431209/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80
1302431109/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/23/2022accepted
80
1302431009/23/2022VulD...typeSupply Chain Management Software09/23/2022accepted
90

27 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!