Show filters
402 Total Results
Displaying 161-170 of 402
Sort by:
Attacker Value
Unknown
CVE-2019-10346
Disclosure Date: July 11, 2019 (last updated October 26, 2023)
A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.
0
Attacker Value
Unknown
CVE-2019-12875
Disclosure Date: June 18, 2019 (last updated November 27, 2024)
Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key.
0
Attacker Value
Unknown
CVE-2019-11403
Disclosure Date: April 22, 2019 (last updated November 27, 2024)
In Gradle Enterprise before 2018.5.2, Build Cache Nodes would reflect the configured password back when viewing the HTML page source of the settings page.
0
Attacker Value
Unknown
CVE-2019-1003063
Disclosure Date: April 04, 2019 (last updated October 26, 2023)
Jenkins Amazon SNS Build Notifier Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
0
Attacker Value
Unknown
CVE-2018-1000415
Disclosure Date: January 09, 2019 (last updated November 27, 2024)
A cross-site scripting vulnerability exists in Jenkins Rebuilder Plugin 1.28 and earlier in RebuildAction/BooleanParameterValue.jelly, RebuildAction/ExtendedChoiceParameterValue.jelly, RebuildAction/FileParameterValue.jelly, RebuildAction/LabelParameterValue.jelly, RebuildAction/ListSubversionTagsParameterValue.jelly, RebuildAction/MavenMetadataParameterValue.jelly, RebuildAction/NodeParameterValue.jelly, RebuildAction/PasswordParameterValue.jelly, RebuildAction/RandomStringParameterValue.jelly, RebuildAction/RunParameterValue.jelly, RebuildAction/StringParameterValue.jelly, RebuildAction/TextParameterValue.jelly, RebuildAction/ValidatingStringParameterValue.jelly that allows users with Job/Configuration permission to insert arbitrary HTML into rebuild forms.
0
Attacker Value
Unknown
obs-service-replace_using_package_version allows to specify arbitrary input fil…
Disclosure Date: October 09, 2018 (last updated November 08, 2023)
A Improper Input Validation vulnerability in Open Build Service allows remote attackers to extract files from the system where the service runs. Affected releases are openSUSE Open Build Service: status of is unknown.
0
Attacker Value
Unknown
Request controller allows to create requests with arbitrary request IDs
Disclosure Date: October 09, 2018 (last updated November 08, 2023)
A Improper Input Validation vulnerability in Open Build Service allows remote attackers to cause DoS by specifying crafted request IDs. Affected releases are openSUSE Open Build Service: versions prior to 01b015ca2a320afc4fae823465d1e72da8bd60df.
0
Attacker Value
Unknown
path traversal in obs-service-tar_scm
Disclosure Date: October 02, 2018 (last updated November 08, 2023)
A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.
0
Attacker Value
Unknown
delete package via link exploit in open buildservice
Disclosure Date: August 01, 2018 (last updated November 08, 2023)
Authorized users of the openbuildservice before 2.9.4 could delete packages by using a malicious request against projects having the OBS:InitializeDevelPackage attribute, a similar issue to CVE-2018-7689.
0
Attacker Value
Unknown
openbuildservice allowed deleting packages via project links
Disclosure Date: August 01, 2018 (last updated November 08, 2023)
openSUSE openbuildservice before 9.2.4 allowed authenticated users to delete packages on specific projects with project links.
0