[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26126 Download | Alert*

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location wher ...

The host is installed with Atlassian Jira Server before 8.5.12, 8.6.0 before 8.13.4, 8.14.0 before 8.15.0 and is prone to an unspecified vulnerability. A flaw is present in the application which fails to properly handle the Jira Editor Plugin. Successful exploitation allows remote anonymous attackers who can perform an attacker in the middle attack to learn which mode a user is editing in due to t ...

The host is installed with Atlassian Jira Server before 8.5.12, 8.6.0 before 8.13.4, 8.14.0 before 8.15.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the invalid filename error message. Successful exploitation could allow remote authenticated attackers to obtain the full path of the Jira application data directory.

The host is installed with Atlassian Jira Server before 8.5.13, 8.6.0 before 8.13.5, 8.14.0 before 8.15.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle the SetFeatureEnabled.jspa resource. Successful exploitation allows remote anonymous attackers to enable and disable Jira Software configuration.

The host is installed with Atlassian Jira Server before 8.13.3, 8.14.0 before 8.14.1 and is prone to an improper authentication vulnerability. A flaw is present in the application which fails to properly handle the `makeRequest` gadget resource. Successful exploitation could allow remote attackers to evade behind-the-firewall protection of app-linked resources.

The host is installed with Atlassian Jira Server before 8.5.11, 8.6.0 before 8.13.3, 8.14.0 before 8.15.0 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. Successful exploitation allows unauthenticated remote attackers to download temporary files and enumerat ...

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.7.2, 8.8.0 before 8.8.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle the /rest/project-templates/1.0/createshared endpoint API endpoint. Successful exploitation could allow remote attackers to enumerate project names.

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.8.2, 8.9.0 before 8.9.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue attachments. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.8.2, 8.9.0 before 8.9.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue attachments. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.5.5, 8.6.0 before 8.8.2, 8.9.0 before 8.9.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue attachments. Successful exploitation allow remote attackers to inject arbitrary HTML or JavaScript.


Pages:      Start    1666    1667    1668    1669    1670    1671    1672    1673    1674    1675    1676    1677    1678    1679    ..   2612

© SecPod Technologies