The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for org.jenkins-ci.plugins:nexus-task-runner.
org.jenkins-ci.plugins:nexus-task-runner is a This plugin executes Sonatype Nexus scheduled tasks after your build.
For example, if you want to refresh your Nexus's repositories index after building your project, you can use execute a Nexus task whose type is "Publish index" using this plugin.
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via the HTTP endpoint. An attacker with Overall/Read permission can cause unauthorized connections to arbitrary URLs with attacker-controlled credentials by sending crafted requests. This endpoint also does not require POST requests, allowing exploitation by submitting crafted requests.