Page 32 of 196 results (0.482 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In JetBrains TeamCity before 2020.2.2, TeamCity server DoS was possible via server integration. En JetBrains TeamCity versiones anteriores a 2020.2.2, una DoS del servidor de TeamCity fue posible por medio de una integración del servidor • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

JetBrains TeamCity before 2020.2 was vulnerable to reflected XSS on several pages. JetBrains TeamCity versiones anteriores a 2020.2, era vulnerable a un ataque de tipo XSS reflejado en varias páginas • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

JetBrains TeamCity before 2020.1.2 was vulnerable to URL injection. JetBrains TeamCity versiones anteriores a 2020.1.2, era vulnerable a una inyección de URL • https://blog.jetbrains.com https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

In JetBrains TeamCity before 2020.1.5, the Guest user had access to audit records. En JetBrains TeamCity versiones anteriores a 2020.1.5, el usuario invitado presentaba un acceso a los registros de auditoría • https://blog.jetbrains.com https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In JetBrains TeamCity before 2020.1.5, secure dependency parameters could be not masked in depending builds when there are no internal artifacts. En JetBrains TeamCity versiones anteriores a 2020.1.5, los parámetros de dependencias seguras no podían ser enmascarados en compilaciones dependiendo de cuando no existan artefactos internos • https://blog.jetbrains.com https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020 •