Latest CVE Feed
-
3.5
LOWCVE-2017-2603
Jenkins before versions 2.44, 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362).... Read more
Affected Products : jenkins- Published: May. 15, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-2602
jenkins before versions 2.44, 2.32.2 is vulnerable to an improper blacklisting of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents (SECURITY-358).... Read more
Affected Products : jenkins- Published: May. 15, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2017-2601
Jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in parameter names and descriptions (SECURITY-353). Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions.... Read more
Affected Products : jenkins- Published: May. 10, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-2600
In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343).... Read more
Affected Products : jenkins- Published: May. 15, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2017-2599
Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321).... Read more
Affected Products : jenkins- Published: Apr. 11, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-2598
Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).... Read more
Affected Products : jenkins- Published: May. 23, 2018
- Modified: Nov. 21, 2024
-
7.7
HIGHCVE-2017-2595
It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal.... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-2594
hawtio before versions 2.0-beta-1, 2.0-beta-2 2.0-m1, 2.0-m2, 2.0-m3, and 1.5 is vulnerable to a path traversal that leads to a NullPointerException with a full stacktrace. An attacker could use this flaw to gather undisclosed information from within hawt... Read more
Affected Products : hawtio- Published: May. 08, 2018
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2017-2592
python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sens... Read more
- Published: May. 08, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-2591
389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could ... Read more
- Published: Apr. 30, 2018
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2017-2590
A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or e... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
9.0
CRITICALCVE-2017-2589
It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy ar... Read more
- Published: Jul. 26, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2017-2587
A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.... Read more
Affected Products : netpbm- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2017-2586
A null pointer dereference vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.... Read more
Affected Products : netpbm- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2017-2585
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.... Read more
- Published: Mar. 12, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2017-2582
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the ... Read more
- Published: Jul. 26, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-2581
An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.... Read more
Affected Products : netpbm- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-2580
An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.... Read more
Affected Products : netpbm- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-2579
An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution.... Read more
Affected Products : netpbm- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2017-2575
A vulnerability was found while fuzzing libbpg 0.9.7. It is a NULL pointer dereference issue due to missing check of the return value of function malloc in the BPG encoder. This vulnerability appeared while converting a malicious JPEG file to BPG.... Read more
Affected Products : libbpg- Published: Aug. 22, 2018
- Modified: Nov. 21, 2024