Show filters
402 Total Results
Displaying 161-170 of 402
Sort by:
Attacker Value
Unknown

CVE-2019-10346

Disclosure Date: July 11, 2019 (last updated October 26, 2023)
A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.
Attacker Value
Unknown

CVE-2019-12875

Disclosure Date: June 18, 2019 (last updated November 27, 2024)
Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key.
0
Attacker Value
Unknown

CVE-2019-11403

Disclosure Date: April 22, 2019 (last updated November 27, 2024)
In Gradle Enterprise before 2018.5.2, Build Cache Nodes would reflect the configured password back when viewing the HTML page source of the settings page.
Attacker Value
Unknown

CVE-2019-1003063

Disclosure Date: April 04, 2019 (last updated October 26, 2023)
Jenkins Amazon SNS Build Notifier Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Attacker Value
Unknown

CVE-2018-1000415

Disclosure Date: January 09, 2019 (last updated November 27, 2024)
A cross-site scripting vulnerability exists in Jenkins Rebuilder Plugin 1.28 and earlier in RebuildAction/BooleanParameterValue.jelly, RebuildAction/ExtendedChoiceParameterValue.jelly, RebuildAction/FileParameterValue.jelly, RebuildAction/LabelParameterValue.jelly, RebuildAction/ListSubversionTagsParameterValue.jelly, RebuildAction/MavenMetadataParameterValue.jelly, RebuildAction/NodeParameterValue.jelly, RebuildAction/PasswordParameterValue.jelly, RebuildAction/RandomStringParameterValue.jelly, RebuildAction/RunParameterValue.jelly, RebuildAction/StringParameterValue.jelly, RebuildAction/TextParameterValue.jelly, RebuildAction/ValidatingStringParameterValue.jelly that allows users with Job/Configuration permission to insert arbitrary HTML into rebuild forms.
0
Attacker Value
Unknown

obs-service-replace_using_package_version allows to specify arbitrary input fil…

Disclosure Date: October 09, 2018 (last updated November 08, 2023)
A Improper Input Validation vulnerability in Open Build Service allows remote attackers to extract files from the system where the service runs. Affected releases are openSUSE Open Build Service: status of is unknown.
0
Attacker Value
Unknown

Request controller allows to create requests with arbitrary request IDs

Disclosure Date: October 09, 2018 (last updated November 08, 2023)
A Improper Input Validation vulnerability in Open Build Service allows remote attackers to cause DoS by specifying crafted request IDs. Affected releases are openSUSE Open Build Service: versions prior to 01b015ca2a320afc4fae823465d1e72da8bd60df.
0
Attacker Value
Unknown

path traversal in obs-service-tar_scm

Disclosure Date: October 02, 2018 (last updated November 08, 2023)
A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.
0
Attacker Value
Unknown

delete package via link exploit in open buildservice

Disclosure Date: August 01, 2018 (last updated November 08, 2023)
Authorized users of the openbuildservice before 2.9.4 could delete packages by using a malicious request against projects having the OBS:InitializeDevelPackage attribute, a similar issue to CVE-2018-7689.
0
Attacker Value
Unknown

openbuildservice allowed deleting packages via project links

Disclosure Date: August 01, 2018 (last updated November 08, 2023)
openSUSE openbuildservice before 9.2.4 allowed authenticated users to delete packages on specific projects with project links.
0