Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2024-28155
Disclosure Date: March 06, 2024 (last updated January 19, 2025)
Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.
0
Attacker Value
Unknown
CVE-2023-32999
Disclosure Date: May 16, 2023 (last updated October 08, 2023)
A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
0
Attacker Value
Unknown
CVE-2023-32998
Disclosure Date: May 16, 2023 (last updated October 08, 2023)
A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
0
Attacker Value
Unknown
CVE-2020-2314
Disclosure Date: November 04, 2020 (last updated February 22, 2025)
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
0
Attacker Value
Unknown
CVE-2020-7358
Disclosure Date: September 18, 2020 (last updated February 22, 2025)
In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.
0
Attacker Value
Unknown
Rapid7 AppSpider Chrome Plugin Insufficient Session Expiration
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
The Chrome Plugin for Rapid7 AppSpider can incorrectly keep browser sessions active after recording a macro, even after a restart of the Chrome browser. This behavior could make future session hijacking attempts easier, since the user could believe a session was closed when it was not. This issue affects Rapid7 AppSpider version 3.8.213 and prior versions, and is fixed in version 3.8.215.
0
Attacker Value
Unknown
CVE-2017-5236
Disclosure Date: May 03, 2017 (last updated November 26, 2024)
Editions of Rapid7 AppSpider Pro installers prior to version 6.14.060 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.
0
Attacker Value
Unknown
CVE-2017-5240
Disclosure Date: May 03, 2017 (last updated November 26, 2024)
Editions of Rapid7 AppSpider Pro prior to version 6.14.060 contain a heap-based buffer overflow in the FLAnalyzer.exe component. A malicious or malformed Flash source file can cause a denial of service condition when parsed by this component, causing the application to crash.
0
Attacker Value
Unknown
CVE-2017-5233
Disclosure Date: March 02, 2017 (last updated November 26, 2024)
Rapid7 AppSpider Pro installers prior to version 6.14.053 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer.
0