Lucene search

K

8 matches found

CVE
CVE
added 2021/07/20 11:15 p.m.99 views

CVE-2021-32751

Gradle is a build tool with a focus on build automation. In versions prior to 7.2, start scripts generated by the application plugin and the gradlew script are both vulnerable to arbitrary code execution when an attacker is able to change environment variables for the user running the script. This ...

8.5CVSS7.5AI score0.00257EPSS
CVE
CVE
added 2021/04/13 8:15 p.m.84 views

CVE-2021-29428

In Gradle before version 7.0, on Unix-like systems, the system temporary directory can be created with open permissions that allow multiple users to create and delete files within it. Gradle builds could be vulnerable to a local privilege escalation from an attacker quickly deleting and recreating ...

8.8CVSS7.7AI score0.00051EPSS
CVE
CVE
added 2021/04/13 8:15 p.m.75 views

CVE-2021-29427

In Gradle from version 5.1 and before version 7.0 there is a vulnerability which can lead to information disclosure and/or dependency poisoning. Repository content filtering is a security control Gradle introduced to help users specify what repositories are used to resolve specific dependencies. Th...

8CVSS7AI score0.00557EPSS
CVE
CVE
added 2021/04/12 10:15 p.m.75 views

CVE-2021-29429

In Gradle before version 7.0, files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle. Some builds could be vulnerable to a local information disclosure. Remote files accessed through TextResourceFactory are downloaded i...

5.5CVSS4.8AI score0.00029EPSS
CVE
CVE
added 2021/09/24 3:15 p.m.38 views

CVE-2021-41586

In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially reset the system user password.

7.5CVSS7.4AI score0.00195EPSS
CVE
CVE
added 2021/09/24 3:15 a.m.32 views

CVE-2021-41584

Gradle Enterprise before 2021.1.3 can allow unauthorized viewing of a response (information disclosure of possibly sensitive build/configuration details) via a crafted HTTP request with the X-Gradle-Enterprise-Ajax-Request header.

7.5CVSS7.4AI score0.00511EPSS
CVE
CVE
added 2021/09/24 3:15 p.m.32 views

CVE-2021-41587

In Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially discover credentials for other resources.

7.5CVSS7.5AI score0.00276EPSS
CVE
CVE
added 2021/09/24 3:15 p.m.32 views

CVE-2021-41588

In Gradle Enterprise before 2021.1.3, a crafted request can trigger deserialization of arbitrary unsafe Java objects. The attacker must have the encryption and signing keys.

8.1CVSS8AI score0.00194EPSS