cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-43044,https://securityvulnerability.io/vulnerability/CVE-2024-43044,Jenkins Vulnerability Allows Agent Processes to Read Arbitrary Files,"An arbitrary file read vulnerability exists in Jenkins versions up to 2.470 and LTS 2.452.3. The flaw arises from the `ClassLoaderProxy#fetchJar` method within the Remoting library, which allows unauthorized agent processes to read sensitive files from the Jenkins controller's file system. This vulnerability poses a significant risk, as it can enable attackers to access confidential information, potentially leading to further exploitation or unauthorized actions within the Jenkins environment. Users are advised to evaluate their installations and apply mitigative steps as recommended by Jenkins security advisories.",Jenkins,Jenkins,8.8,HIGH,0.0005000000237487257,false,,true,false,true,2024-08-08T20:55:32.000Z,true,true,true,2024-09-06T16:52:02.855Z,2024-08-07T13:27:11.438Z,7785