[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15243 Download | Alert*

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a code injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Templates feature. Successful exploitation could allow remote attackers with administrator permissions to execute arbitrary code via Template Injection leading to Remote Cod ...

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the jira-importers-plugin. Successful exploitation could allow remote attackers to modify several resources (including CsvFieldMappingsPage.jspa and ImporterValueMappingsP ...

The host is installed with Atlassian Jira Server before 8.13.18, or 8.20.0 before 8.20.6 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/RestoreDefaults.jspa endpoint. Successful exploitation could allow remote attackers to restore the default configuration of fields via a Cross-Site Reque ...

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...

The host is installed with Atlassian Jira Server before 8.13.14, or 8.14.0 before 8.19.0 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to properly handle an issue in the GIF Image Reader component. Successful exploitation could allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability.

The host is installed with Atlassian Jira Server before 8.5.14, 8.6.0 before 8.13.6, or 8.14.0 before 8.16.1 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle an issue in the /WEB-INF/web.xml endpoint. Successful exploitation could allow remote attackers to read particular files via a path traversal vulnerability.

The utilities function in all versions <= 0.5.0 of the deep-extend node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.


Pages:      Start    1015    1016    1017    1018    1019    1020    1021    1022    1023    1024    1025    1026    1027    1028    ..   1524

© SecPod Technologies