5
CVSSv2

CVE-2020-2100

Published: 29/01/2020 Updated: 25/10/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.8 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Jenkins 2.218 and previous versions, LTS 2.204.1 and previous versions was vulnerable to a UDP amplification reflection denial of service attack on port 33848.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins jenkins

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities in Jenkins and Jenkins plugins <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Be ...

Github Repositories

DDoS反射源探测

ddos_reflection DDoS反射源(放大器)放大倍数计算 BAF: bandwidth amplification factor 带宽放大倍数 PAF: packet amplification factor 包数放大倍数 python3 反射探测规则模版 支持3种格式的反射载荷 1 hexstream 实例 'arms': { 'service': 'arms', 'protocol': 'net Assistant Appl