[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Atlassian Jira Server before 8.13.18, or 8.20.0 before 8.20.6 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/RestoreDefaults.jspa endpoint. Successful exploitation could allow remote attackers to restore the default configuration of fields via a Cross-Site Reque ...

The host is installed with Atlassian Jira Server before 8.13.18, or 8.20.0 before 8.20.6 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/RestoreDefaults.jspa endpoint. Successful exploitation could allow remote attackers to restore the default configuration of fields via a Cross-Site Reque ...

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...


Pages:      Start    11205    11206    11207    11208    11209    11210    11211    11212    11213    11214    11215    11216    11217    11218    ..   19541

© SecPod Technologies