Show filters
71 Total Results
Displaying 11-20 of 71
Sort by:
Attacker Value
Unknown

CVE-2021-21698

Disclosure Date: November 04, 2021 (last updated October 26, 2023)
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
Attacker Value
Unknown

CVE-2020-17525

Disclosure Date: March 17, 2021 (last updated February 22, 2025)
Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7
Attacker Value
Unknown

CVE-2020-2304

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Attacker Value
Unknown

CVE-2020-15789

Disclosure Date: September 09, 2020 (last updated February 22, 2025)
A vulnerability has been identified in Polarion Subversion Webclient (All versions). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify contents of the web application.
Attacker Value
Unknown

CVE-2020-15788

Disclosure Date: September 09, 2020 (last updated February 22, 2025)
A vulnerability has been identified in Polarion Subversion Webclient (All versions). The Polarion subversion web application does not filter user input in a way that prevents Cross-Site Scripting. If a user is enticed into passing specially crafted, malicious input to the web client (e.g. by clicking on a malicious URL with embedded JavaScript), then JavaScript code can be returned and may then be executed by the user’s client. Various actions could be triggered by running malicious JavaScript code.
Attacker Value
Unknown

CVE-2020-2199

Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.
Attacker Value
Unknown

CVE-2020-9344

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
Subversion ALM for the enterprise before 8.8.2 allows reflected XSS at multiple locations.
Attacker Value
Unknown

CVE-2020-2152

Disclosure Date: March 09, 2020 (last updated February 21, 2025)
Jenkins Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.
Attacker Value
Unknown

CVE-2020-2111

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.
Attacker Value
Unknown

CVE-2018-11782

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.