[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10984 Download | Alert*

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a code injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Templates feature. Successful exploitation could allow remote attackers with administrator permissions to execute arbitrary code via Template Injection leading to Remote Cod ...

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the jira-importers-plugin. Successful exploitation could allow remote attackers to modify several resources (including CsvFieldMappingsPage.jspa and ImporterValueMappingsP ...

The host is installed with Atlassian Jira Server before 8.13.18, or 8.20.0 before 8.20.6 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/RestoreDefaults.jspa endpoint. Successful exploitation could allow remote attackers to restore the default configuration of fields via a Cross-Site Reque ...

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...

The host is installed with Atlassian Jira Server before 8.13.14, or 8.14.0 before 8.19.0 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to properly handle an issue in the GIF Image Reader component. Successful exploitation could allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability.

The host is installed with Atlassian Jira Server before 8.5.14, 8.6.0 before 8.13.6, or 8.14.0 before 8.16.1 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle an issue in the /WEB-INF/web.xml endpoint. Successful exploitation could allow remote attackers to read particular files via a path traversal vulnerability.

Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.


Pages:      Start    659    660    661    662    663    664    665    666    667    668    669    670    671    672    ..   1098

© SecPod Technologies