[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

The host is installed with Atlassian Jira Server before 8.5.12, 8.6.0 before 8.13.4, 8.14.0 before 8.15.0 and is prone to an unspecified vulnerability. A flaw is present in the application which fails to properly handle the Jira Editor Plugin. Successful exploitation allows remote anonymous attackers who can perform an attacker in the middle attack to learn which mode a user is editing in due to t ...

The host is installed with Atlassian Jira Server before 8.5.12, 8.6.0 before 8.13.4, 8.14.0 before 8.15.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the invalid filename error message. Successful exploitation could allow remote authenticated attackers to obtain the full path of the Jira application data directory.

The host is installed with Atlassian Jira Server before 8.5.13, 8.6.0 before 8.13.5, 8.14.0 before 8.15.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle the SetFeatureEnabled.jspa resource. Successful exploitation allows remote anonymous attackers to enable and disable Jira Software configuration.

The host is installed with Atlassian Jira Server before 8.13.3, 8.14.0 before 8.14.1 and is prone to an improper authentication vulnerability. A flaw is present in the application which fails to properly handle the `makeRequest` gadget resource. Successful exploitation could allow remote attackers to evade behind-the-firewall protection of app-linked resources.

The host is installed with Atlassian Jira Server before 8.5.11, 8.6.0 before 8.13.3, 8.14.0 before 8.15.0 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. Successful exploitation allows unauthenticated remote attackers to download temporary files and enumerat ...

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.7.2, 8.8.0 before 8.8.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle the /rest/project-templates/1.0/createshared endpoint API endpoint. Successful exploitation could allow remote attackers to enumerate project names.

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.8.2, 8.9.0 before 8.9.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue attachments. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.8.2, 8.9.0 before 8.9.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue attachments. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.8.2, 8.9.0 before 8.9.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue attachments. Successful exploitation allow remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.5.15, 8.6.0 before 8.13.7 and 8.14.0 before 8.17.0 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the QueryComponentRendererValue!Default.jspa endpoint. Successful exploitation allows an unauthenticated user to enumerate users.


Pages:      Start    1689    1690    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    1702    ..   2683

© SecPod Technologies