Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6380 | The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification. |
Github GHSA |
GHSA-p487-39h9-hm84 | Jenkins Google Login Plugin 1.0 and 1.1 allows anonymous users to authenticate through client-side request modification |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:09.316Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5298
No data.
Status : Modified
Published: 2022-07-07T19:15:07.590
Modified: 2024-11-21T02:32:44.437
Link: CVE-2015-5298
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA