[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26349 Download | Alert*

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...

The host is installed with Atlassian Jira Server before 8.13.14, or 8.14.0 before 8.19.0 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to properly handle an issue in the GIF Image Reader component. Successful exploitation could allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability.

The host is installed with Atlassian Jira Server before 8.5.14, 8.6.0 before 8.13.6, or 8.14.0 before 8.16.1 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle an issue in the /WEB-INF/web.xml endpoint. Successful exploitation could allow remote attackers to read particular files via a path traversal vulnerability.

A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests. An attacker who successfully exploited this vulnerability could execute code in the context of the Report Server service account. To exploit the vulnerability, an authenticated attacker would need to submit a specially crafted page request to an affected Reporting Serv ...

The host is installed with Visual Studio code before 1.71.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with JetBrains YouTrack versions less than 22.1.43700 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle improper neutralization of input during web page generation. Successful exploitation could allow attackers to cause cross-site scripting.

The host is installed with JetBrains YouTrack versions less than 22.1.43563 and is prone to a privelege escalation vulnerability. A flaw is present in the application, which fails to properly handle restriction of rendered UI layers or frames. Successful exploitation could allow attackers to include an iframe fron a third-party domain in the issue description.


Pages:      Start    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    1702    1703    1704    ..   2634

© SecPod Technologies