CONS3RT Plugin up to 1.0.0 on Jenkins cross-site request forgery

A vulnerability classified as problematic has been found in CONS3RT Plugin up to 1.0.0 on Jenkins (Jenkins Plugin). This affects an unknown code. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

126

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%36
50%11

Approve Conf

90%36
80%11
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302437609/23/2022VulD...price_0day$0-$5ksee exploit price documentation09/23/2022accepted
90
1302437509/23/2022VulD...cvss3_meta_tempscore6.5see CVSS documentation09/23/2022accepted
90
1302437409/23/2022VulD...cvss3_meta_basescore6.5see CVSS documentation09/23/2022accepted
90
1302437309/23/2022VulD...cvss3_vuldb_tempscore4.3see CVSS documentation09/23/2022accepted
90
1302437209/23/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation09/23/2022accepted
90
1302437109/23/2022VulD...cvss2_vuldb_tempscore5.0see CVSS documentation09/23/2022accepted
90
1302437009/23/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation09/23/2022accepted
90
1302436909/23/2022VulD...cvss3_nvd_basescore8.8nist.gov09/23/2022accepted
90
1302436809/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302436709/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302436609/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302436509/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302436409/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector09/23/2022accepted
80
1302436309/23/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector09/23/2022accepted
80
1302436209/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302436109/23/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector09/23/2022accepted
80
1302436009/23/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector09/23/2022accepted
80
1302435909/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80
1302435809/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/23/2022accepted
80
1302435709/23/2022VulD...typeJenkins Plugin09/23/2022accepted
90

27 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!