Show filters
402 Total Results
Displaying 121-130 of 402
Sort by:
Attacker Value
Unknown

CVE-2022-34179

Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Attacker Value
Unknown

CVE-2022-34178

Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
Attacker Value
Unknown

CVE-2022-30049

Disclosure Date: May 15, 2022 (last updated February 23, 2025)
A Server-Side Request Forgery (SSRF) in Rebuild v2.8.3 allows attackers to obtain the real IP address and scan Intranet information via the fileurl parameter.
Attacker Value
Unknown

CVE-2022-21949

Disclosure Date: April 20, 2022 (last updated February 23, 2025)
A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13.
Attacker Value
Unknown

CVE-2022-25518

Disclosure Date: March 22, 2022 (last updated February 23, 2025)
In CMDBuild from version 3.0 to 3.3.2 payload requests are saved in a temporary log table, which allows attackers with database access to read the password of the users who login to the application by querying the database table.
Attacker Value
Unknown

CVE-2022-1011

Disclosure Date: March 18, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
Attacker Value
Unknown

CVE-2022-27207

Disclosure Date: March 15, 2022 (last updated February 23, 2025)
Jenkins global-build-stats Plugin 1.5 and earlier does not escape multiple fields in the chart configuration on the 'Global Build Stats' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Attacker Value
Unknown

CVE-2021-3744

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.
Attacker Value
Unknown

CVE-2021-3609

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
Attacker Value
Unknown

CVE-2021-36777

Disclosure Date: February 23, 2022 (last updated February 23, 2025)
A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef.