Show filters
100 Total Results
Displaying 51-60 of 100
Sort by:
Attacker Value
Unknown
CVE-2020-5812
Disclosure Date: February 06, 2021 (last updated February 22, 2025)
Nessus AMI versions 8.12.0 and earlier were found to either not validate, or incorrectly validate, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack.
0
Attacker Value
Unknown
CVE-2020-2187
Disclosure Date: May 06, 2020 (last updated February 21, 2025)
Jenkins Amazon EC2 Plugin 1.50.1 and earlier unconditionally accepts self-signed certificates and does not perform hostname validation, enabling man-in-the-middle attacks.
0
Attacker Value
Unknown
CVE-2020-2185
Disclosure Date: May 06, 2020 (last updated February 21, 2025)
Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks.
0
Attacker Value
Unknown
CVE-2020-2186
Disclosure Date: May 06, 2020 (last updated February 21, 2025)
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier allows attackers to provision instances.
0
Attacker Value
Unknown
CVE-2020-2188
Disclosure Date: May 06, 2020 (last updated February 21, 2025)
A missing permission check in Jenkins Amazon EC2 Plugin 1.50.1 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2020-12144
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal.
0
Attacker Value
Unknown
CVE-2020-12142
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.
0
Attacker Value
Unknown
CVE-2020-12143
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator.
0
Attacker Value
Unknown
CVE-2020-2180
Disclosure Date: April 16, 2020 (last updated February 21, 2025)
Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
0
Attacker Value
Unknown
CVE-2020-2090
Disclosure Date: January 15, 2020 (last updated February 21, 2025)
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
0