Vulnerability Details CVE-2016-4986
Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.9%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2016-4986
-
cpe:2.3:a:jenkins:tap:1.0
-
cpe:2.3:a:jenkins:tap:1.1
-
cpe:2.3:a:jenkins:tap:1.10
-
cpe:2.3:a:jenkins:tap:1.11
-
cpe:2.3:a:jenkins:tap:1.12
-
cpe:2.3:a:jenkins:tap:1.13
-
cpe:2.3:a:jenkins:tap:1.14
-
cpe:2.3:a:jenkins:tap:1.15
-
cpe:2.3:a:jenkins:tap:1.16
-
cpe:2.3:a:jenkins:tap:1.17
-
cpe:2.3:a:jenkins:tap:1.19
-
cpe:2.3:a:jenkins:tap:1.2
-
cpe:2.3:a:jenkins:tap:1.2.1
-
cpe:2.3:a:jenkins:tap:1.2.2
-
cpe:2.3:a:jenkins:tap:1.2.3
-
cpe:2.3:a:jenkins:tap:1.2.4
-
cpe:2.3:a:jenkins:tap:1.2.5
-
cpe:2.3:a:jenkins:tap:1.2.6
-
cpe:2.3:a:jenkins:tap:1.2.7
-
cpe:2.3:a:jenkins:tap:1.2.8
-
cpe:2.3:a:jenkins:tap:1.20
-
cpe:2.3:a:jenkins:tap:1.21
-
cpe:2.3:a:jenkins:tap:1.22
-
cpe:2.3:a:jenkins:tap:1.23
-
cpe:2.3:a:jenkins:tap:1.24
-
cpe:2.3:a:jenkins:tap:1.3
-
cpe:2.3:a:jenkins:tap:1.5
-
cpe:2.3:a:jenkins:tap:1.6
-
cpe:2.3:a:jenkins:tap:1.7
-
cpe:2.3:a:jenkins:tap:1.8
-
cpe:2.3:a:jenkins:tap:1.9