Show filters
133 Total Results
Displaying 101-110 of 133
Sort by:
Attacker Value
Unknown

CVE-2018-20103

Disclosure Date: December 12, 2018 (last updated November 08, 2023)
An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
0
Attacker Value
Unknown

CVE-2018-18397

Disclosure Date: December 12, 2018 (last updated November 27, 2024)
The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
0
Attacker Value
Unknown

CVE-2018-1000865

Disclosure Date: December 10, 2018 (last updated November 27, 2024)
A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed.
0
Attacker Value
Unknown

CVE-2018-1000866

Disclosure Date: December 10, 2018 (last updated November 27, 2024)
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM
0
Attacker Value
Unknown

CVE-2018-1000864

Disclosure Date: December 10, 2018 (last updated November 27, 2024)
A denial of service vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
0
Attacker Value
Unknown

CVE-2018-1000862

Disclosure Date: December 10, 2018 (last updated November 27, 2024)
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
0
Attacker Value
Unknown

CVE-2018-1000863

Disclosure Date: December 10, 2018 (last updated November 27, 2024)
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
0
Attacker Value
Unknown

CVE-2018-1000861

Disclosure Date: December 10, 2018 (last updated November 27, 2024)
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
Attacker Value
Unknown

CVE-2018-18311

Disclosure Date: December 07, 2018 (last updated November 08, 2023)
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
0
Attacker Value
Unknown

CVE-2018-1002105

Disclosure Date: December 05, 2018 (last updated November 08, 2023)
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server's TLS credentials used to establish the backend connection.
0