Show filters
25 Total Results
Displaying 21-25 of 25
Sort by:
Attacker Value
Unknown
CVE-2019-16370
Disclosure Date: September 16, 2019 (last updated November 27, 2024)
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
0
Attacker Value
Unknown
CVE-2019-15052
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007.
0
Attacker Value
Unknown
CVE-2019-9843
Disclosure Date: June 28, 2019 (last updated November 08, 2023)
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file.
0
Attacker Value
Unknown
CVE-2019-11065
Disclosure Date: April 10, 2019 (last updated November 08, 2023)
Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
0
Attacker Value
Unknown
CVE-2016-6199
Disclosure Date: February 07, 2017 (last updated November 26, 2024)
ObjectSocketWrapper.java in Gradle 2.12 allows remote attackers to execute arbitrary code via a crafted serialized object.
0