Show filters
71 Total Results
Displaying 11-20 of 71
Sort by:
Attacker Value
Unknown
CVE-2021-21698
Disclosure Date: November 04, 2021 (last updated October 26, 2023)
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
0
Attacker Value
Unknown
CVE-2020-17525
Disclosure Date: March 17, 2021 (last updated February 22, 2025)
Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7
0
Attacker Value
Unknown
CVE-2020-2304
Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
0
Attacker Value
Unknown
CVE-2020-15789
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
A vulnerability has been identified in Polarion Subversion Webclient (All versions). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify contents of the web application.
0
Attacker Value
Unknown
CVE-2020-15788
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
A vulnerability has been identified in Polarion Subversion Webclient (All versions). The Polarion subversion web application does not filter user input in a way that prevents Cross-Site Scripting. If a user is enticed into passing specially crafted, malicious input to the web client (e.g. by clicking on a malicious URL with embedded JavaScript), then JavaScript code can be returned and may then be executed by the user’s client. Various actions could be triggered by running malicious JavaScript code.
0
Attacker Value
Unknown
CVE-2020-2199
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.
0
Attacker Value
Unknown
CVE-2020-9344
Disclosure Date: March 20, 2020 (last updated February 21, 2025)
Subversion ALM for the enterprise before 8.8.2 allows reflected XSS at multiple locations.
0
Attacker Value
Unknown
CVE-2020-2152
Disclosure Date: March 09, 2020 (last updated February 21, 2025)
Jenkins Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.
0
Attacker Value
Unknown
CVE-2020-2111
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.
0
Attacker Value
Unknown
CVE-2018-11782
Disclosure Date: September 26, 2019 (last updated November 27, 2024)
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
0