Latest CVE Feed
-
4.3
MEDIUMCVE-2015-5326
Cross-site scripting (XSS) vulnerability in the slave overview page in Jenkins before 1.638 and LTS before 1.625.2 allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via the slave offline status message.... Read more
- EPSS Score: %0.12
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2015-5325
Jenkins before 1.638 and LTS before 1.625.2 allow attackers to bypass intended slave-to-master access restrictions by leveraging a JNLP slave. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3665.... Read more
- EPSS Score: %0.13
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-5324
Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to queue/api.... Read more
- EPSS Score: %0.21
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.5
MEDIUMCVE-2015-5323
Jenkins before 1.638 and LTS before 1.625.2 do not properly restrict access to API tokens which might allow remote administrators to gain privileges and run scripts by using an API token of another user.... Read more
- EPSS Score: %0.20
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-5322
Directory traversal vulnerability in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to list directory contents and read arbitrary files in the Jenkins servlet resources via directory traversal sequences in a request to jnlpJars/.... Read more
- EPSS Score: %0.23
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-5321
The sidepanel widgets in the CLI command overview and help pages in Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to the pages.... Read more
- EPSS Score: %0.15
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-5320
Jenkins before 1.638 and LTS before 1.625.2 do not properly verify the shared secret used in JNLP slave connections, which allows remote attackers to connect as slaves and obtain sensitive information or possibly gain administrative access by leveraging k... Read more
- EPSS Score: %0.15
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-5319
XML external entity (XXE) vulnerability in the create-job CLI command in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to read arbitrary files via a crafted job configuration that is then used in an "XML-aware tool," as demonstrated ... Read more
- EPSS Score: %0.23
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2015-5318
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.... Read more
- EPSS Score: %0.06
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2015-5317
The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.... Read more
- Actively Exploited
- EPSS Score: %28.62
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2015-5306
OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.... Read more
Affected Products : ironic_inspector- EPSS Score: %0.47
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.0
MEDIUMCVE-2015-5242
OpenStack Swift-on-File (aka Swiftonfile) does not properly restrict use of the pickle Python module when loading metadata, which allows remote authenticated users to execute arbitrary code via a crafted extended attribute (xattrs).... Read more
Affected Products : gluster_storage- EPSS Score: %1.20
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2014-3665
Jenkins before 1.587 and LTS before 1.580.1 do not properly ensure trust separation between a master and slaves, which might allow remote attackers to execute arbitrary code on the master by leveraging access to the slave.... Read more
Affected Products : jenkins- EPSS Score: %0.34
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
4.3
MEDIUMCVE-2015-7288
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 allow remote attackers to modify the configuration via a command in an SMS message, as demonstrated by a "4 2" command.... Read more
- EPSS Score: %1.10
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
7.5
HIGHCVE-2015-7287
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 use the same 001984 default PIN across different customers' installations, which allows remote attackers to execute commands by leveraging knowledge of this PIN and including it in an SMS m... Read more
- EPSS Score: %5.71
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.4
MEDIUMCVE-2015-7286
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote attackers to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN p... Read more
- EPSS Score: %1.49
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
5.8
MEDIUMCVE-2015-7285
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 do not require authentication from Alarm Receiving Center (ARC) servers, which allows man-in-the-middle attackers to bypass intended access restrictions via a spoofed HSxx response.... Read more
- EPSS Score: %0.36
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
6.8
MEDIUMCVE-2015-6379
The XML parser in the management interface in Cisco Adaptive Security Appliance (ASA) Software 8.4 allows remote authenticated users to cause a denial of service (device crash) via a crafted XML document, aka Bug ID CSCut14223.... Read more
- EPSS Score: %0.78
- Published: Nov. 25, 2015
- Modified: Apr. 12, 2025
-
7.8
HIGHCVE-2015-8330
The PCo agent in SAP Plant Connectivity (PCo) allows remote attackers to cause a denial of service (memory corruption and agent crash) via crafted xMII requests, aka SAP Security Note 2238619.... Read more
Affected Products : plant_connectivity- EPSS Score: %3.35
- Published: Nov. 24, 2015
- Modified: Apr. 12, 2025
-
5.0
MEDIUMCVE-2015-8329
SAP Manufacturing Integration and Intelligence (aka MII, formerly xMII) uses weak encryption (Base64 and DES), which allows attackers to conduct downgrade attacks and decrypt passwords via unspecified vectors, aka SAP Security Note 2240274.... Read more
Affected Products : manufacturing_integration_and_intelligence- EPSS Score: %0.15
- Published: Nov. 24, 2015
- Modified: Apr. 12, 2025