[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193578 Download | Alert*

It was discovered that PHP"s implementation of SOAP HTTP Digest authentication performed insufficient error validation, which may result in a stack information leak or use of weak randomness.

It was discovered that PHP"s implementation of SOAP HTTP Digest authentication performed insufficient error validation, which may result in a stack information leak or use of weak randomness.

Debian 12.x is installed

The host is installed with Atlassian Jira Server before 7.13.16, 8.0.0 before 8.5.5, 8.6.0 before 8.8.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle issues in the XML export view. Successful exploitation allow remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 7.13.16, 8.0.0 before 8.5.5, 8.6.0 before 8.8.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle issues in the XML export view. Successful exploitation allow remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server 7.6.0 before 8.5.4 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle issues in the VerifyPopServerConnection!add.jspa component. Successful exploitation allows remote attackers an attacker to enumerate hosts and open ports on the internal network where Jira server is prese ...

The host is installed with Atlassian Jira Server 7.6.0 before 8.5.4 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle issues in the VerifyPopServerConnection!add.jspa component. Successful exploitation allows remote attackers an attacker to enumerate hosts and open ports on the internal network where Jira server is prese ...

The host is installed with Atlassian Jira Server 7.6.0 before 8.5.4 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle issues in the VerifySmtpServerConnection!add.jspa component. Successful exploitation allows an attacker to enumerate hosts and open ports on the internal network where Jira server is present.

The host is installed with Atlassian Jira Server 7.6.0 before 8.5.4 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle issues in the VerifySmtpServerConnection!add.jspa component. Successful exploitation allows an attacker to enumerate hosts and open ports on the internal network where Jira server is present.

The host is installed with Atlassian Jira Server before 7.13.12, 8.0.0 before 8.4.3, 8.5.0 before 8.5.2 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle issues in the WorkflowResource class removeStatus method. Successful exploitation allows authenticated remote attackers who do not have project administration access to re ...


Pages:      Start    11242    11243    11244    11245    11246    11247    11248    11249    11250    11251    11252    11253    11254    11255    ..   19357

© SecPod Technologies