Language:
Severity: High
ID: 165764
File Name: cloudbees-security-advisory-2022-07-27.nasl
Version: 1.4
Type: combined
Agent: windows, macosx, unix
Family: CGI abuses
Published: 10/7/2022
Updated: 6/4/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus Agent, Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 5.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-36920
Risk Factor: High
Base Score: 8.8
Temporal Score: 7.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/a:cloudbees:jenkins
Required KB Items: installed_sw/Jenkins
Exploit Ease: No known exploits are available
Patch Publication Date: 7/27/2022
Vulnerability Publication Date: 7/27/2022
CVE: CVE-2022-36881, CVE-2022-36882, CVE-2022-36883, CVE-2022-36884, CVE-2022-36885, CVE-2022-36886, CVE-2022-36887, CVE-2022-36888, CVE-2022-36889, CVE-2022-36890, CVE-2022-36891, CVE-2022-36892, CVE-2022-36893, CVE-2022-36894, CVE-2022-36895, CVE-2022-36896, CVE-2022-36897, CVE-2022-36898, CVE-2022-36899, CVE-2022-36900, CVE-2022-36901, CVE-2022-36902, CVE-2022-36903, CVE-2022-36904, CVE-2022-36905, CVE-2022-36906, CVE-2022-36907, CVE-2022-36908, CVE-2022-36909, CVE-2022-36910, CVE-2022-36911, CVE-2022-36912, CVE-2022-36913, CVE-2022-36914, CVE-2022-36915, CVE-2022-36916, CVE-2022-36917, CVE-2022-36918, CVE-2022-36919, CVE-2022-36920, CVE-2022-36921, CVE-2022-36922