[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26126 Download | Alert*

The host is installed with Atlassian Jira Server before 8.5.15, 8.6.0 before 8.13.7 and 8.14.0 before 8.17.0 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the QueryComponentRendererValue!Default.jspa endpoint. Successful exploitation allows an unauthenticated user to enumerate users.

The host is installed with Atlassian Jira Server before 8.5.12, 8.6.0 before 8.13.4 and 8.14.0 before 8.15.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the issue navigation and search view. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnera ...

The host is installed with Atlassian Jira Server before 8.13.5, 8.14.0 before 8.15.1 and is prone to an incorrect authorization vulnerability. A flaw is present in the application which fails to properly handle the dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server. Successful exploitation allows remote anonymous attackers to obtain gadget related settings vi ...

The host is installed with Atlassian Jira Server before 8.5.13, 8.6.0 before 8.13.5 and 8.14.0 before 8.15.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the membersOf JQL search function. Successful exploitation allows remote anonymous attackers to determine if a group exists and members of groups if they are assigned ...

The host is installed with Atlassian Jira Server before 8.5.13, 8.6.0 before 8.13.5 and 8.14.0 before 8.15.1 and is prone to an incorrect authorization vulnerability. A flaw is present in the application which fails to properly handle missing permissions check. Successful exploitation allows remote anonymous attackers to determine if a username is valid or not.

The host is installed with Atlassian Jira Server before 8.5.11, 8.6.0 before 8.13.3 and 8.14.0 before 8.15.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the ViewWorkflowSchemes.jspa and ListWorkflows.jspa endpoints. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.13.2, 8.14.0 before 8.14.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the issues in the mobile site view. Successful exploitation could allow unauthenticated remote attackers to view custom field and custom SLA names.

The host is installed with Atlassian Jira Server before 8.5.11, 8.6.0 before 8.13.3 and 8.14.0 before 8.15.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle Custom Fields on Screens Modal. Successful exploitation could allow remote attackers to inject arbitrary html and javascript.

An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Micr ...

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Server 2008 R2 IA64, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an information disclosure vulnerability. A flaw is present which exists when Windows fails to properly handle uninitialized memory when parsing certain, specially crafted PNG image format files. A ...


Pages:      Start    1667    1668    1669    1670    1671    1672    1673    1674    1675    1676    1677    1678    1679    1680    ..   2612

© SecPod Technologies