Show filters
403 Total Results
Displaying 181-190 of 403
Sort by:
Attacker Value
Unknown

CVE-2017-16003

Disclosure Date: May 29, 2018 (last updated November 26, 2024)
windows-build-tools is a module for installing C++ Build Tools for Windows using npm. windows-build-tools versions below 1.0.0 download resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown

openbuildservice webui code injection

Disclosure Date: March 20, 2018 (last updated November 08, 2023)
In the web ui of the openbuildservice before 2.3.0 a code injection of the project rebuildtimes statistics could be used by authorized attackers to execute shellcode.
0
Attacker Value
Unknown

open-build-service retrigger / wipebinaries hitting the wrong project bypassing…

Disclosure Date: March 01, 2018 (last updated November 08, 2023)
In the open build service before 201707022 the wipetrigger and rebuild actions checked the wrong project for permissions, allowing authenticated users to cause operations on projects where they did not have permissions leading to denial of service (resource consumption).
0
Attacker Value
Unknown

OBS worker VM escape via relative symbolic links

Disclosure Date: March 01, 2018 (last updated November 08, 2023)
The bs_worker code in open build service before 20170320 followed relative symlinks, allowing reading of files outside of the package source directory during build, allowing leakage of private information.
0
Attacker Value
Unknown

CVE-2017-1000389

Disclosure Date: January 26, 2018 (last updated November 26, 2024)
Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability.
0
Attacker Value
Unknown

CVE-2017-1000387

Disclosure Date: January 26, 2018 (last updated November 26, 2024)
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
0
Attacker Value
Unknown

CVE-2017-1000089

Disclosure Date: October 05, 2017 (last updated November 26, 2024)
Builds in Jenkins are associated with an authentication that controls the permissions that the build has to interact with other elements in Jenkins. The Pipeline: Build Step Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins.
0
Attacker Value
Unknown

CVE-2017-7952

Disclosure Date: May 16, 2017 (last updated November 26, 2024)
INFOR EAM V11.0 Build 201410 has SQL injection via search fields, related to the filtervalue parameter.
0
Attacker Value
Unknown

CVE-2016-4988

Disclosure Date: February 09, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in the Build Failure Analyzer plugin before 1.16.0 in Jenkins allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.
Attacker Value
Unknown

CVE-2016-3968

Disclosure Date: April 06, 2016 (last updated November 25, 2024)
Multiple cross-site scripting (XSS) vulnerabilities in Sophos Cyberoam CR100iNG UTM appliance with firmware 10.6.3 MR-1 build 503, CR35iNG UTM appliance with firmware 10.6.2 MR-1 build 383, and CR35iNG UTM appliance with firmware 10.6.2 Build 378 allow remote attackers to inject arbitrary web script or HTML via the (1) ipFamily parameter to corporate/webpages/trafficdiscovery/LiveConnections.jsp; the (2) ipFamily, (3) applicationname, or (4) username parameter to corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp; or the (5) X-Forwarded-For HTTP header.
0