CVE | Severity | Pipelines Fix Version | Reason |
---|---|---|---|
High | 1.63.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.55.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.55.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.54.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.52.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.51.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.50.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.50.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.49.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.49.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.49.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.49.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
Medium | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
Critical | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.44.0 | Build runtimes were vulnerable to malicious scripts. | |
High | 1.27.0 | User can cause stack exhaustion using jfrog cli in a step, but this would merely lead to a step failing. | |
High | 1.27.0 | Jfrog cli prevents a max buffer from being passed by the user. | |
Medium | 1.24.0 | Removed node-fetch dependency. |