Today > | 3 Medium | 2 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report analyzes how threat actors can exploit misconfigured Jenkins servers to execute malicious Groovy scripts, leading to activities like deploying cryptocurrency miners. Misconfigurations exposing the /script endpoint allow remote code execution, enabling attackers to run scripts that downl…