Show filters
402 Total Results
Displaying 131-140 of 402
Sort by:
Attacker Value
Unknown

CVE-2022-25184

Disclosure Date: February 15, 2022 (last updated February 23, 2025)
Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs.
Attacker Value
Unknown

CVE-2021-42099

Disclosure Date: November 30, 2021 (last updated February 23, 2025)
Zoho ManageEngine M365 Manager Plus before 4421 is vulnerable to file-upload remote code execution.
Attacker Value
Unknown

CVE-2021-41589

Disclosure Date: October 27, 2021 (last updated February 23, 2025)
In Gradle Enterprise before 2021.3 (and Enterprise Build Cache Node before 10.0), there is potential cache poisoning and remote code execution when running the build cache node with its default configuration. This configuration allows anonymous access to the configuration user interface and anonymous write access to the build cache. If access control to the build cache is not changed from the default open configuration, a malicious actor with network access can populate the cache with manipulated entries that may execute malicious code as part of a build process. This applies to the build cache provided with Gradle Enterprise and the separate build cache node service if used. If access control to the user interface is not changed from the default open configuration, a malicious actor can undo build cache access control in order to populate the cache with manipulated entries that may execute malicious code as part of a build process. This does not apply to the build cache provided with…
Attacker Value
Unknown

CVE-2021-3642

Disclosure Date: August 05, 2021 (last updated February 23, 2025)
A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.
Attacker Value
Unknown

CVE-2021-33629

Disclosure Date: July 26, 2021 (last updated February 23, 2025)
isula-build before 0.9.5-6 can cause a program crash, when building container images, some functions for processing external data do not remove spaces when processing data.
Attacker Value
Unknown

CVE-2021-3536

Disclosure Date: May 20, 2021 (last updated February 22, 2025)
A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.
Attacker Value
Unknown

CVE-2021-21628

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Attacker Value
Unknown

CVE-2021-21629

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters.
Attacker Value
Unknown

CVE-2021-20218

Disclosure Date: March 16, 2021 (last updated February 22, 2025)
A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2
Attacker Value
Unknown

CVE-2020-28430

Disclosure Date: February 23, 2021 (last updated November 08, 2023)
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
0