Vulnerabilities (CVE)

Filtered by vendor Jfrog Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-46687 1 Jfrog 1 Artifactory 2022-07-13 6.8 MEDIUM 4.9 MEDIUM
JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
CVE-2021-45721 1 Jfrog 1 Artifactory 2022-07-13 4.3 MEDIUM 6.1 MEDIUM
JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38.
CVE-2021-41834 1 Jfrog 1 Artifactory 2022-06-03 4.0 MEDIUM 6.5 MEDIUM
JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation.
CVE-2021-45730 1 Jfrog 1 Artifactory 2022-05-26 4.0 MEDIUM 4.9 MEDIUM
JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators.
CVE-2019-10322 1 Jfrog 1 Artifactory 2020-10-01 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-10323 1 Jfrog 1 Artifactory 2020-10-01 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2020-2164 1 Jfrog 1 Artifactory 2020-03-27 4.0 MEDIUM 6.5 MEDIUM
Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.
CVE-2019-10321 1 Jfrog 1 Artifactory 2019-06-05 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-10324 1 Jfrog 1 Artifactory 2019-06-03 4.3 MEDIUM 6.5 MEDIUM
A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively.