Show filters
38 Total Results
Displaying 21-30 of 38
Sort by:
Attacker Value
Unknown
CVE-2021-37631
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin.
0
Attacker Value
Unknown
CVE-2021-39133
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, a user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions. Patches are available in Rundeck versions 3.4.3 and 3.3.14.
0
Attacker Value
Unknown
CVE-2021-39132
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, an authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition. The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:`admin` level access to the `system` resource type. The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions: `create` `update` or `admin` level access to a `project_acl` resource, and/or`create` `update` or `admin` level access to the `system_…
0
Attacker Value
Unknown
CVE-2021-22913
Disclosure Date: June 11, 2021 (last updated February 22, 2025)
Nextcloud Deck before 1.2.7, 1.4.1 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only the local Nextcloud server unless a global search has been explicitly chosen by the user.
0
Attacker Value
Unknown
CVE-2020-8297
Disclosure Date: February 23, 2021 (last updated February 22, 2025)
Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user.
0
Attacker Value
Unknown
CVE-2020-8235
Disclosure Date: October 05, 2020 (last updated February 22, 2025)
Missing access control in Nextcloud Deck 1.0.4 caused an insecure direct object reference allowing an attacker to view all attachments.
0
Attacker Value
Unknown
CVE-2020-8182
Disclosure Date: October 05, 2020 (last updated February 22, 2025)
Improper access control in Nextcloud Deck 0.8.0 allowed an attacker to reshare boards shared with them with more permissions than they had themselves.
0
Attacker Value
Unknown
CVE-2020-8179
Disclosure Date: July 02, 2020 (last updated February 21, 2025)
Improper access control in Nextcloud Deck 1.0.0 allowed an attacker to inject tasks into other users decks.
0
Attacker Value
Unknown
CVE-2020-11009
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
In Rundeck before version 3.2.6, authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. This vulnerability is patched in version 3.2.6
0
Attacker Value
Unknown
CVE-2020-2144
Disclosure Date: March 09, 2020 (last updated February 21, 2025)
Jenkins Rundeck Plugin 3.6.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
0