Product Detail
CONFIGURATION AS CODE
https://plugins.jenkins.io/configuration-as-code
Public Exploit/PoC Code :
1
CISA Actively Exploited :
0
Last Vulnerability Seen :
Jan. 12, 2022
Vulnerabilities
The following vulnerabilities are recorded
CONFIGURATION AS CODE product. You can click on the
vulnerability to view more details.
| Number | Published | CVE ID | Severity | CVSS Score | |
|---|---|---|---|---|---|
| 1 | Jan 12, 2022 | CVE-2022-23106 | MEDIUM |
5.3
|
|
| 2 | Aug 07, 2019 | CVE-2019-10367 | MEDIUM |
5.5
|
|
| 3 | Jul 31, 2019 | CVE-2019-10363 | MEDIUM |
4.9
|
|
| 4 | Jul 31, 2019 | CVE-2019-10362 | MEDIUM |
5.5
|
|
| 5 | Jul 31, 2019 | CVE-2019-10345 | MEDIUM |
5.5
|
|
| 6 | Jul 31, 2019 | CVE-2019-10344 | MEDIUM |
4.3
|
|
| 7 | Jul 31, 2019 | CVE-2019-10343 | LOW |
3.3
|
|
| 8 | Jun 26, 2018 | CVE-2018-1000610 | HIGH |
8.8
|
|
| 9 | Jun 26, 2018 | CVE-2018-1000609 | MEDIUM |
6.5
|