Show filters
402 Total Results
Displaying 81-90 of 402
Sort by:
Attacker Value
Unknown

CVE-2024-1098

Disclosure Date: January 31, 2024 (last updated February 26, 2025)
A vulnerability was found in Rebuild up to 3.5.5 and classified as problematic. This issue affects the function QiniuCloud.getStorageFile of the file /filex/proxy-download. The manipulation of the argument url leads to information disclosure. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252455.
Attacker Value
Unknown

CVE-2024-1021

Disclosure Date: January 29, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.5.5. Affected by this issue is the function readRawText of the component HTTP Request Handler. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252290 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2024-1020

Disclosure Date: January 29, 2024 (last updated February 26, 2025)
A vulnerability classified as problematic was found in Rebuild up to 3.5.5. Affected by this vulnerability is the function getStorageFile of the file /filex/proxy-download. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252289 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2020-36770

Disclosure Date: January 15, 2024 (last updated January 23, 2024)
pkg_postinst in the Gentoo ebuild for Slurm through 22.05.3 unnecessarily calls chown to assign root's ownership on files in the live root filesystem. This could be exploited by the slurm user to become the owner of root-owned files.
Attacker Value
Unknown

CVE-2023-6394

Disclosure Date: December 09, 2023 (last updated February 25, 2025)
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
Attacker Value
Unknown

CVE-2023-6393

Disclosure Date: December 06, 2023 (last updated February 25, 2025)
A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
Attacker Value
Unknown

CVE-2023-43502

Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to delete Failure Causes.
Attacker Value
Unknown

CVE-2023-43501

Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A missing permission check in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
Attacker Value
Unknown

CVE-2023-43500

Disclosure Date: September 20, 2023 (last updated February 25, 2025)
A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.
Attacker Value
Unknown

CVE-2023-43499

Disclosure Date: September 20, 2023 (last updated February 25, 2025)
Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not escape Failure Cause names in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or update Failure Causes.