[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15134 Download | Alert*

The pcpu_embed_first_chunk function in mm/percpu.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "pages/cpu" printk call.

The host is installed with Atlassian Jira Server version 7.4.0 before version 8.4.0 and is prone to a cross site request forgery. A flaw is present in the application which fails to properly handle the Webwork action. Successful exploitation could allow attackers to to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance.

Use of Cache Containing Sensitive Information in Atlassian Jira Server version 7.13.0 before version 8.4.0. A flaw is present in the application which fails to properly handle the AccessLogFilter class. Successful exploitation could allow attackers to learn details about other users, including their username.

The host is installed with Atlassian Jira Server version 7.12.0 before version 7.13.7, from version 8.0.0 before version 8.3.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the FilterPickerPopup.jspa resource. Successful exploitation could allow attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server version 7.6.0 before version 8.4.0 and is prone to an incorrect authorization check vulnerability. A flaw is present in the application which fails to properly handle the /rest/api/1.0/render resource. Successful exploitation could allow attackers to determine if an attachment with a specific name exists and if an issue key is valid.

The host is installed with Atlassian Jira Server version 7.13.0 before version 8.3.2 and is prone to a cross site request forgery vulnerability. A flaw is present in the application which fails to properly handle the ServiceExecutor resource. Successful exploitation could allow attackers to trigger the creation of export files.

The host is installed with Atlassian Jira Server version 7.6.0 before version 8.3.2 and is prone to an incorrect authorization check vulnerability. A flaw is present in the application which fails to properly handle the /rest/issueNav/1/issueTable resource. Successful exploitation could allow attackers to enumerate usernames.

The host is installed with Atlassian Jira Server version 7.13.0 before version 7.13.7, from version 8.0.0 before version 8.3.2 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the worklog rest resources. Successful exploitation could allow attackers to view worklog time information.

The host is installed with Atlassian Jira Server version 7.7 before version 7.13.6, from version 8.0.0 before version 8.3.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the wikirenderer component. Successful exploitation could allow attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server version 7.13.0 before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 and is prone to a open redirect vulnerability. A flaw is present in the application which fails to properly handle the ChangeSharedFilterOwner resource. Successful exploitation could allow attackers to attack users, in some case ...


Pages:      Start    1000    1001    1002    1003    1004    1005    1006    1007    1008    1009    1010    1011    1012    1013    ..   1513

© SecPod Technologies