Lucene search

K

11 matches found

CVE
CVE
added 2025/07/28 5:15 p.m.7 views

CVE-2025-54529

In JetBrains TeamCity before 2025.07 a CSRF was possible in external OAuth login integration

7.5CVSS6.6AI score0.00001EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.7 views

CVE-2025-54536

In JetBrains TeamCity before 2025.07 a CSRF was possible on GraphQL endpoint

8.8CVSS6.6AI score0.00004EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.6 views

CVE-2025-54530

In JetBrains TeamCity before 2025.07 privilege escalation was possible due to incorrect directory permissions

9.8CVSS6.8AI score0.00001EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54528

In JetBrains TeamCity before 2025.07 a CSRF was possible in GitHub App connection flow

8.8CVSS6.6AI score0.00004EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54531

In JetBrains TeamCity before 2025.07 path traversal was possible via plugin unpacking on Windows

9.4CVSS6.6AI score0.00001EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54532

In JetBrains TeamCity before 2025.07 improper access control allowed disclosure of build settings via snapshot dependencies

4.3CVSS6.5AI score0.00003EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54533

In JetBrains TeamCity before 2025.07 improper access control allowed disclosure of build settings via VCS configuration

4.3CVSS6.5AI score0.00003EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54534

In JetBrains TeamCity before 2025.07 reflected XSS was possible on the agentpushPreset page

4.8CVSS5.8AI score0.00016EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54535

In JetBrains TeamCity before 2025.07 password reset and email verification tokens were using weak hashing algorithms

7.5CVSS6.8AI score0.00001EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54537

In JetBrains TeamCity before 2025.07 user credentials were stored in plain text in memory snapshots

5.5CVSS6.4AI score0.00001EPSS
CVE
CVE
added 2025/07/28 5:15 p.m.5 views

CVE-2025-54538

In JetBrains TeamCity before 2025.07 password exposure was possible via command line in the "hg pull" command

5.5CVSS6.8AI score0.00001EPSS