Lucene search

K

5 matches found

CVE
CVE
added 2020/10/12 10:15 p.m.97 views

CVE-2019-17444

Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.

9.8CVSS9.5AI score0.90854EPSS
CVE
CVE
added 2020/01/23 3:15 p.m.58 views

CVE-2020-7931

In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certai...

8.8CVSS8.8AI score0.32705EPSS
CVE
CVE
added 2020/03/25 5:15 p.m.57 views

CVE-2020-2164

Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

6.5CVSS6.4AI score0.00258EPSS
CVE
CVE
added 2020/03/25 5:15 p.m.53 views

CVE-2020-2165

Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

7.5CVSS7.5AI score0.00331EPSS
CVE
CVE
added 2020/03/16 8:15 p.m.50 views

CVE-2019-19937

In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to "undesirable results."

7.2CVSS6.9AI score0.00496EPSS