Skip to content

TechMedia

Header Image
Category

MODERATE

588 Posts

Featured

Posted byWpmaster
[vitess.io/vitess] vitess allows users to create keyspaces that can deny access to already existing keyspaces
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to account takeover because password reset links do not expire
Posted byWpmaster
[thorsten/phpmyfaq] thorsten/phpmyfaq vulnerable to improper access control
Posted byWpmaster
[thorsten/phpmyfaq] thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via updatecategory parameter

[com.redgate.plugins.redgatesqlci:redgate-sql-ci] Redgate SQL Change Automation Plugin stored credentials in plain text

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

Redgate SQL Change Automation Plugin 2.0.4 and earlier stores a NuGet API key unencrypted in job config.xml files as part of its configuration. This credential could be viewed by users with Extended Read permission or access to the Jenkins controller f…

[org.jenkins-ci.plugins:cloudbees-jenkins-advisor] Missing permission checks in Health Advisor by CloudBees Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient.
Additionally…

[org.jenkins-ci.plugins:ec2] Missing permission checks in Jenkins Amazon EC2 Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified cr…

[org.jenkins-ci.plugins:cloudbees-jenkins-advisor] CSRF vulnerability in Health Advisor by CloudBees Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient.
Additionally…

[org.springframework:spring-web] Pivotal Spring Framework contains unsafe Java deserialization methods

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/10/2022

Pivotal Spring Framework before 6.0.0 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authenti…

[org.jenkins-ci.plugins:google-compute-engine] Jenkins Google Compute Engine Plugin Missing Authorization vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/07/2022

Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment. Google Compute Engin…

[org.jenkins-ci.plugins:google-compute-engine] Jenkins Google Compute Engine Plugin Cross-Site Request Forgery vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/07/2022

A cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin 4.1.1 and earlier in ComputeEngineCloud#doProvision could be used to provision new agents. Google Compute Engine Plugin 4.2.0 requires POST requests for this API endpoin…

[org.jenkins-ci.plugins:google-compute-engine] Jenkins Google Compute Engine Plugin does not verify SSH host keys when connecting agents created by the plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/07/2022

Jenkins Google Compute Engine Plugin 4.1.1 and earlier does not verify SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks. Google Compute Engine Plugin 4.2.0 verifies SSH host keys before executing any comman…

[org.jenkins-ci.plugins:anchore-container-scanner] Jenkins Anchore Container Scanner Plugin vulnerable to Insufficiently Protected Credentials

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/07/2022

Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
The cr…

[org.jenkins-ci.plugins:jira] Jenkins JIRA Plugin allows users to select and use credentials with System scope

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/07/2022

Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope. Jira Plugin 3.0.11 defines the appropriate folder context for crede…

Posts navigation

Previous Posts 1 … 49 50 51 52 53 … 59 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close