CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
In JetBrains TeamCity before 2020.2.2, permission checks for changing TeamCity plugins were implemented improperly. |
In JetBrains TeamCity before 2020.2.2, audit logs were not sufficient when an administrator uploaded a file. |
In JetBrains TeamCity before 2020.2.2, XSS was potentially possible on the test history page. |
In the TeamCity IntelliJ plugin before 2020.2.2.85899, DoS was possible. |
Information disclosure in the TeamCity plugin for IntelliJ before 2020.2.2.85899 was possible because a local temporary file had Insecure Permissions. |
In JetBrains TeamCity before 2020.2.1, permissions during user deletion were checked improperly. |
In JetBrains TeamCity before 2020.2.1, permissions during token removal were checked improperly. |
In JetBrains TeamCity before 2020.2, an ECR token could be exposed in a build's parameters. |
In JetBrains TeamCity before 2020.2.1, the server admin could create and see access tokens for any other users. |
In JetBrains TeamCity before 2020.2.1, a user could get access to the GitHub access token of another user. |
JetBrains TeamCity before 2020.2 was vulnerable to reflected XSS on several pages. |
In JetBrains TeamCity before 2020.2.2, TeamCity server DoS was possible via server integration. |
In JetBrains TeamCity before 2019.2, several user-level pages were vulnerable to XSS. |
JetBrains TeamCity before 2019.2 was vulnerable to a stored XSS attack by a user with the developer role. |
In JetBrains TeamCity before 2019.1.5, some server-stored passwords could be shown via the web UI. |
In JetBrains TeamCity before 2019.1.5, reverse tabnabbing was possible on several pages. |
JetBrains TeamCity Plugin before 2020.2.85695 SSRF. Vulnerability that could potentially expose user credentials. |
In JetBrains TeamCity before 2020.1.5, secure dependency parameters could be not masked in depending builds when there are no internal artifacts. |
In JetBrains TeamCity before 2020.1.5, the Guest user had access to audit records. |
JetBrains TeamCity before 2020.1.2 was vulnerable to URL injection. |