Lucene search

K

Enterprise Security Vulnerabilities

cve
cve

CVE-2006-5741

Multiple cross-site scripting (XSS) vulnerabilities in AirMagnet Enterprise before 7.5 build 6307 allow remote attackers to inject arbitrary web script or HTML via (1) the 404 error page of the Smart Sensor Edge Sensor; (2) the user name for a failed logon, when displayed in the audit journals revi...

6AI Score

0.006EPSS

2006-11-06 06:07 PM
17
cve
cve

CVE-2006-5742

The AirMagnet Enterprise console and Remote Sensor console (Laptop) in AirMagnet Enterprise before 7.5 build 6307 allows remote attackers to inject arbitrary web script or HTML from a certain embedded Internet Explorer object into an SSID template value, aka "Cross-Application Scripting (XAS)".

6.6AI Score

0.011EPSS

2006-11-06 06:07 PM
21
cve
cve

CVE-2006-5746

The console in AirMagnet Enterprise before 7.5 build 6307 does not properly validate the Enterprise Server certificate, which allows remote attackers to read network traffic via a man-in-the-middle (MITM) attack, possibly related to the use of self-signed certificates.

7AI Score

0.005EPSS

2006-11-06 06:07 PM
20
cve
cve

CVE-2008-7312

The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address.

6.9AI Score

0.001EPSS

2012-08-23 10:32 AM
18
cve
cve

CVE-2019-11402

In Gradle Enterprise before 2018.5.3, Build Cache Nodes did not store the credentials at rest in an encrypted format.

9.8CVSS

9.3AI Score

0.004EPSS

2019-04-22 11:29 AM
26
cve
cve

CVE-2019-11403

In Gradle Enterprise before 2018.5.2, Build Cache Nodes would reflect the configured password back when viewing the HTML page source of the settings page.

9.8CVSS

9.4AI Score

0.002EPSS

2019-04-22 11:29 AM
20
cve
cve

CVE-2019-7272

Optergy Proton/Enterprise devices allow Username Disclosure.

5.3CVSS

5.3AI Score

0.042EPSS

2019-07-01 09:15 PM
93
cve
cve

CVE-2019-7273

Optergy Proton/Enterprise devices allow Cross-Site Request Forgery (CSRF).

8.8CVSS

8.7AI Score

0.009EPSS

2019-07-01 09:15 PM
89
cve
cve

CVE-2019-7274

Optergy Proton/Enterprise devices allow Authenticated File Upload with Code Execution as root.

9.8CVSS

9.6AI Score

0.04EPSS

2019-07-01 09:15 PM
96
cve
cve

CVE-2019-7275

Optergy Proton/Enterprise devices allow Open Redirect.

6.1CVSS

6.3AI Score

0.004EPSS

2019-07-01 08:15 PM
54
cve
cve

CVE-2019-7276

Optergy Proton/Enterprise devices allow Remote Root Code Execution via a Backdoor Console.

9.8CVSS

9.4AI Score

0.945EPSS

2019-07-01 08:15 PM
102
cve
cve

CVE-2019-7277

Optergy Proton/Enterprise devices allow Unauthenticated Internal Network Information Disclosure.

5.3CVSS

5.4AI Score

0.003EPSS

2019-07-01 08:15 PM
52
cve
cve

CVE-2019-7278

Optergy Proton/Enterprise devices have an Unauthenticated SMS Sending Service.

6.5CVSS

6.6AI Score

0.003EPSS

2019-07-01 08:15 PM
58
cve
cve

CVE-2019-7279

Optergy Proton/Enterprise devices have Hard-coded Credentials.

7.3CVSS

7.2AI Score

0.006EPSS

2019-07-01 07:15 PM
50
cve
cve

CVE-2020-15767

An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS add...

5.3CVSS

5.1AI Score

0.001EPSS

2020-09-18 02:15 PM
20
cve
cve

CVE-2020-15768

An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potenti...

7.5CVSS

7.3AI Score

0.005EPSS

2020-09-18 02:15 PM
15
3
cve
cve

CVE-2020-15769

An issue was discovered in Gradle Enterprise 2020.2 - 2020.2.4. An XSS issue exists via the request URL.

6.1CVSS

5.9AI Score

0.001EPSS

2020-09-18 02:15 PM
18
cve
cve

CVE-2020-15770

An issue was discovered in Gradle Enterprise 2018.5. An attacker can potentially make repeated attempts to guess a local user's password, due to lack of lock-out after excessive failed logins.

5.5CVSS

5.3AI Score

0.0004EPSS

2020-09-18 02:15 PM
16
3
cve
cve

CVE-2020-15771

An issue was discovered in Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1. Cross-site transmission of cookie containing CSRF token allows remote attacker to bypass CSRF mitigation.

7.5CVSS

7.5AI Score

0.004EPSS

2020-09-18 02:15 PM
20
cve
cve

CVE-2020-15772

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. When configuring Gradle Enterprise to integrate with a SAML identity provider, an XML metadata file can be uploaded by an administrator. The server side processing of this file dereferences XML External Entities (XXE), allowing a remot...

4.9CVSS

5.1AI Score

0.001EPSS

2020-09-18 02:15 PM
17
2
cve
cve

CVE-2020-15773

An issue was discovered in Gradle Enterprise before 2020.2.4. Because of unrestricted cross-origin requests to read-only data in the Export API, an attacker can access data as a user (for the duration of the browser session) after previously explicitly authenticating with the API.

6.5CVSS

6.3AI Score

0.001EPSS

2020-09-18 03:15 PM
20
cve
cve

CVE-2020-15774

An issue was discovered in Gradle Enterprise 2018.5 - 2020.2.4. An attacker with physical access to the browser of a user who has recently logged in to Gradle Enterprise and since closed their browser could reopen their browser to access Gradle Enterprise as that user.

6.8CVSS

6.3AI Score

0.001EPSS

2020-09-18 02:15 PM
14
3
cve
cve

CVE-2020-15775

An issue was discovered in Gradle Enterprise 2017.1 - 2020.2.4. The /usage page of Gradle Enterprise conveys high level build information such as project names and build counts over time. This page is incorrectly viewable anonymously.

7.5CVSS

7.3AI Score

0.002EPSS

2020-09-18 02:15 PM
21
3
cve
cve

CVE-2020-15776

An issue was discovered in Gradle Enterprise 2018.2 - 2020.2.4. The CSRF prevention token is stored in a request cookie that is not annotated as HttpOnly. An attacker with the ability to execute arbitrary code in a user's browser could impose an arbitrary value for this token, allowing them to perf...

8.8CVSS

8.7AI Score

0.006EPSS

2020-09-18 02:15 PM
24
2
cve
cve

CVE-2021-41584

Gradle Enterprise before 2021.1.3 can allow unauthorized viewing of a response (information disclosure of possibly sensitive build/configuration details) via a crafted HTTP request with the X-Gradle-Enterprise-Ajax-Request header.

7.5CVSS

7.4AI Score

0.004EPSS

2021-09-24 03:15 AM
21
cve
cve

CVE-2021-41586

In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially reset the system user password.

7.5CVSS

7.4AI Score

0.001EPSS

2021-09-24 03:15 PM
24
cve
cve

CVE-2021-41587

In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially discover credentials for other resources.

7.5CVSS

7.5AI Score

0.002EPSS

2021-09-24 03:15 PM
19
cve
cve

CVE-2021-41588

In Gradle Enterprise before 2021.1.3, a crafted request can trigger deserialization of arbitrary unsafe Java objects. The attacker must have the encryption and signing keys.

8.1CVSS

8AI Score

0.004EPSS

2021-09-24 03:15 PM
19
cve
cve

CVE-2021-41589

In Gradle Enterprise before 2021.3 (and Enterprise Build Cache Node before 10.0), there is potential cache poisoning and remote code execution when running the build cache node with its default configuration. This configuration allows anonymous access to the configuration user interface and anonymo...

9.8CVSS

9.6AI Score

0.008EPSS

2021-10-27 02:15 PM
21
cve
cve

CVE-2021-41590

In Gradle Enterprise through 2021.3, probing of the server-side network environment can occur via an SMTP configuration test. The installation configuration user interface available to administrators allows testing the configured SMTP server settings. This test function can be used to identify the ...

5.3CVSS

5.2AI Score

0.001EPSS

2021-10-27 02:15 PM
19
cve
cve

CVE-2021-41619

An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of the...

7.2CVSS

7.6AI Score

0.003EPSS

2021-10-27 02:15 PM
20
cve
cve

CVE-2022-25364

In Gradle Enterprise before 2021.4.2, the default built-in build cache configuration allowed anonymous write access. If this was not manually changed, a malicious actor with network access to the build cache could potentially populate it with manipulated entries that execute malicious code as part ...

8.1CVSS

8.1AI Score

0.002EPSS

2022-03-17 05:15 PM
57
cve
cve

CVE-2022-27225

Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari ...

6.5CVSS

6.3AI Score

0.002EPSS

2022-03-16 01:15 AM
64
cve
cve

CVE-2022-27919

Gradle Enterprise before 2022.1 allows remote code execution if the installation process did not specify an initial configuration file. The configuration allows certain anonymous access to administration and an API.

9.8CVSS

9.7AI Score

0.004EPSS

2022-03-25 08:15 PM
55
cve
cve

CVE-2022-30586

Gradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to code execution.

7.2CVSS

7.2AI Score

0.001EPSS

2022-06-06 07:15 PM
37
7
cve
cve

CVE-2022-30587

Gradle Enterprise through 2022.2.2 has Incorrect Access Control that leads to information disclosure.

7.5CVSS

7.2AI Score

0.002EPSS

2022-06-06 08:15 PM
44
7
cve
cve

CVE-2022-41574

An access-control vulnerability in Gradle Enterprise 2022.4 through 2022.3.1 allows remote attackers to prevent backups from occurring, and send emails with arbitrary text content to the configured installation-administrator contact address, via HTTP access to an accidentally exposed internal endpo...

7.5CVSS

7.5AI Score

0.002EPSS

2022-10-07 09:15 PM
16
5
cve
cve

CVE-2022-41575

A credential-exposure vulnerability in the support-bundle mechanism in Gradle Enterprise 2022.3 through 2022.3.3 allows remote attackers to access a subset of application data (e.g., cleartext credentials). This is fixed in 2022.3.3.

7.5CVSS

7.1AI Score

0.002EPSS

2022-10-21 12:15 PM
24
cve
cve

CVE-2023-49238

In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in befor...

9.8CVSS

9.4AI Score

0.001EPSS

2024-01-09 02:15 AM
14