Total
168 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-7908 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
In JetBrains TeamCity before 2019.1.5, reverse tabnabbing was possible on several pages. | |||||
CVE-2020-35667 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
JetBrains TeamCity Plugin before 2020.2.85695 SSRF. Vulnerability that could potentially expose user credentials. | |||||
CVE-2020-27629 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains TeamCity before 2020.1.5, secure dependency parameters could be not masked in depending builds when there are no internal artifacts. | |||||
CVE-2020-27628 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
In JetBrains TeamCity before 2020.1.5, the Guest user had access to audit records. | |||||
CVE-2020-27627 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
JetBrains TeamCity before 2020.1.2 was vulnerable to URL injection. | |||||
CVE-2020-15831 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
JetBrains TeamCity before 2019.2.3 is vulnerable to reflected XSS in the administration UI. | |||||
CVE-2020-15830 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
JetBrains TeamCity before 2019.2.3 is vulnerable to stored XSS in the administration UI. | |||||
CVE-2020-15829 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains TeamCity before 2019.2.3, password parameters could be disclosed via build logs. | |||||
CVE-2020-15828 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
In JetBrains TeamCity before 2020.1.1, project parameter values can be retrieved by a user without appropriate permissions. | |||||
CVE-2020-15826 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
In JetBrains TeamCity before 2020.1, users are able to assign more permissions than they have. | |||||
CVE-2020-15825 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges. | |||||
CVE-2020-11938 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
In JetBrains TeamCity 2018.2 through 2019.2.1, a project administrator was able to see scrambled password parameters used in a project. The issue was resolved in 2019.2.2. | |||||
CVE-2020-11689 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
In JetBrains TeamCity before 2019.2.1, a user without appropriate permissions was able to import settings from the settings.kts file. | |||||
CVE-2020-11688 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains TeamCity before 2019.2.1, the application state is kept alive after a user ends his session. | |||||
CVE-2020-11687 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains TeamCity before 2019.2.2, password values were shown in an unmasked format on several pages. | |||||
CVE-2020-11686 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 2.7 LOW |
In JetBrains TeamCity before 2019.1.4, a project administrator was able to retrieve some TeamCity server settings. | |||||
CVE-2019-18367 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains TeamCity before 2019.1.2, a non-destructive operation could be performed by a user without the corresponding permissions. | |||||
CVE-2019-18366 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains TeamCity before 2019.1.2, secure values could be exposed to users with the "View build runtime parameters and data" permission. | |||||
CVE-2019-18365 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
In JetBrains TeamCity before 2019.1.4, reverse tabnabbing was possible on several pages. | |||||
CVE-2019-18364 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In JetBrains TeamCity before 2019.1.4, insecure Java Deserialization could potentially allow remote code execution. |