Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2019-10462
A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
32.0%
CVSS Severity
CVSS v3 Score
8.1
CVSS v2 Score
6.8
References
http://www.openwall.com/lists/oss-security/2019/10/23/2
https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20%281%29
http://www.openwall.com/lists/oss-security/2019/10/23/2
https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20%281%29
Products affected by CVE-2019-10462
Jenkins
»
Dynatrace Application Monitoring
»
Version:
1.0.10
cpe:2.3:a:jenkins:dynatrace_application_monitoring:1.0.10
Jenkins
»
Dynatrace Application Monitoring
»
Version:
2.0.4
cpe:2.3:a:jenkins:dynatrace_application_monitoring:2.0.4
Jenkins
»
Dynatrace Application Monitoring
»
Version:
2.0.5
cpe:2.3:a:jenkins:dynatrace_application_monitoring:2.0.5
Jenkins
»
Dynatrace Application Monitoring
»
Version:
2.0.7
cpe:2.3:a:jenkins:dynatrace_application_monitoring:2.0.7
Jenkins
»
Dynatrace Application Monitoring
»
Version:
2.1.0
cpe:2.3:a:jenkins:dynatrace_application_monitoring:2.1.0
Jenkins
»
Dynatrace Application Monitoring
»
Version:
2.1.3
cpe:2.3:a:jenkins:dynatrace_application_monitoring:2.1.3
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved