[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26631 Download | Alert*

The host is installed with JetBrains TeamCity before 147331 (2023.11) and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in permissions. On successful exploitation, Users with access to the agent machine might obtain permissions of the user running the agent process.

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle issues in permissions. Successful exploitation allows an authenticated users without administrative permissions to register other users when self-registration was disabled

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to an authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in validation of URL parameters. Successful exploitation allows an attacker to bypass Two-Factor Authentication (2FA).

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to a reflected XSS vulnerability. A flaw is present in the application, which fails to properly handle issues in space connection configuration. Successful exploitation allows an attacker to cause reflected XSS.

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issues in agent distribution settings. Successful exploitation allows an attacker to cause cross-site scripting.

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to a XML external entity reference vulnerability. A flaw is present in the application, which fails to properly handle issues in the Maven build steps detector. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with JetBrains TeamCity before 156166 (2024.03) and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to remove arbitrary files from the server by installing tools.

The host is installed with JetBrains TeamCity before 2023.11.4 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle issues in presigned URL generation requests in S3 artifact storage plugin. successful exploitation allows an attacker to cause unspecified impact.

The host is installed with JetBrains TeamCity before 2023.11.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vector. On successful exploitation, custom build parameters of the "password" type could be disclosed.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2663

© SecPod Technologies