Jenkins CLI RMI Java Deserialization Vulnerability (Nov 2015) - Active Check CVE-2015-8103
- Severity
- Vulnerability description
- Not available
- Risk description
- Not available
- Recommendation
- Not available
- References
- https://www.jenkins.io/security/advisory/2015-11-11/https://www.jenkins.io/blog/2015/11/06/mitigating-unauthenticated-remote-code-execution-0-day-in-jenkins-cli/https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/jenkins.pyhttps://seclists.org/oss-sec/2015/q4/241https://web.archive.org/web/20210122210513/http://www.securityfocus.com/bid/77636
- Codename
- Not available
- Detectable with
- Network Scanner
- Scan engine
- OpenVAS
- Exploitable with Sniper
- No
- CVE Published
- Not available
- Detection added at
- Software Type
- Not available
- Vendor
- Not available
- Product
- Not available
Detect this vulnerability now!
Check your clients' targets (or your own) for this vulnerability and thousands more! Get proof for validation with our ethical hacking toolkit.