Page 3 of 32 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2018.5. An attacker can potentially make repeated attempts to guess a local user's password, due to lack of lock-out after excessive failed logins. Se detectó un problema en Gradle Enterprise versión 2018.5. Un atacante puede hacer repetidos intentos de adivinar la contraseña de un usuario local, debido a la falta de bloqueo después de excesivos inicios de sesión fallidos • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15770 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1. Cross-site transmission of cookie containing CSRF token allows remote attacker to bypass CSRF mitigation. Se detectó un problema en Gradle Enterprise versiones 2018.2 y en Gradle Enterprise Build Cache Node versión 4.1. La transmisión cruzada de una cookie que contiene un token CSRF permite al atacante remoto evitar la mitigación de CSRF • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15771 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remote attacker with administrative access to perform server side request forgery. Se detectó un problema en Gradle Enterprise versiones 2018.5 - 2020.2.4. Al configurar Gradle Enterprise para integrarse con un proveedor de identidad SAML, un archivo de metadatos XML puede ser cargado por un administrador. • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15772 • CWE-611: Improper Restriction of XML External Entity Reference CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. An attacker with physical access to the browser of a user who has recently logged in to Gradle Enterprise and since closed their browser could reopen their browser to access Gradle Enterprise as that user. Se detectó un problema en Gradle Enterprise versiones 2018.5 - 2020.2.4. Un atacante con acceso físico al navegador de un usuario que se ha conectado recientemente a Gradle Enterprise y que desde entonces ha cerrado su navegador podría reabrirlo para acceder a Gradle Enterprise como ese usuario • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15774 • CWE-613: Insufficient Session Expiration •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Gradle Enterprise 2017.1 - 2020.2.4. The /usage page of Gradle Enterprise conveys high level build information such as project names and build counts over time. This page is incorrectly viewable anonymously. Se detectó un problema en Gradle Enterprise versiones 2017.1 - 2020.2.4. La página de uso de Gradle Enterprise transmite información de alto nivel como nombres de proyectos y recuentos de construcción a lo largo del tiempo. • https://github.com/gradle/gradle/security/advisories https://security.gradle.com/advisory/CVE-2020-15775 • CWE-922: Insecure Storage of Sensitive Information •