{"uuid": "8fd30677-0f6f-4fb5-95bf-28393cb885f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-8103", "type": "seen", "source": "https://t.me/arpsyndicate/1747", "content": "#ExploitObserverAlert\n\nCVE-2015-8103\n\nDESCRIPTION: Exploit Observer has 66 entries related to CVE-2015-8103. The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the \"Groovy variant in 'ysoserial'\".\n\nFIRST-EPSS: 0.393800000\nNVD-IS: 6.4\nNVD-ES: 10.0", "creation_timestamp": "2023-12-11T13:47:19.000000Z"}