21 results (0.007 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. El plugin Jenkins CVS versiones 2.19 y anteriores, no escapa del nombre y la descripción de los parámetros CVS Symbolic Name en las visualizaciones que muestran parámetros, resultando en una vulnerabilidad de scripting cruzado (XSS) almacenada que puede ser explotada por atacantes con permiso Item/Configure • https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins CVS Plugin 2.16 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins CVS Plugin versiones 2.16 y anteriores, no configuran su analizador XML para impedir ataques de tipo XML external entity (XXE) • http://www.openwall.com/lists/oss-security/2020/12/03/2 https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2146 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response. Desbordamiento de búfer basado en memoria dinámica en la funcion proxy_connect en src/client.c en CVS v1.11 y v1.12 permite a los servidores proxy HTTP remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de una respuesta HTTP manipulada. • http://lists.opensuse.org/opensuse-updates/2012-02/msg00064.html http://rhn.redhat.com/errata/RHSA-2012-0321.html http://secunia.com/advisories/47869 http://secunia.com/advisories/48063 http://secunia.com/advisories/48142 http://secunia.com/advisories/48150 http://ubuntu.com/usn/usn-1371-1 http://www.debian.org/security/2012/dsa-2407 http://www.mandriva.com/security/advisories?name=MDVSA-2012:044 http://www.osvdb.org/78987 http://www.securityfocus.com/bid/51943 h • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

CVS 1.12 and earlier on Debian GNU/Linux, when using the repouid patch, allows remote attackers to bypass authentication via the pserver access method. • http://www.debian.org/security/2005/dsa-715 •

CVSS: 7.5EPSS: 84%CPEs: 17EXPL: 0

Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code. • http://bugs.gentoo.org/attachment.cgi?id=54352&action=view http://secunia.com/advisories/14976 http://www.debian.org/security/2005/dsa-742 http://www.gentoo.org/security/en/glsa/glsa-200504-16.xml http://www.novell.com/linux/security/advisories/2005_24_cvs.html http://www.redhat.com/support/errata/RHSA-2005-387.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20148 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9688 https://access •