[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198218 Download | Alert*

The host is installed with Atlassian Jira Server before 8.13.18, or 8.20.0 before 8.20.6 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/RestoreDefaults.jspa endpoint. Successful exploitation could allow remote attackers to restore the default configuration of fields via a Cross-Site Reque ...

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.13.21, or 8.14.0 before 8.20.9 and is prone to an improper access control vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/EditSubscription.jspa endpoint. Successful exploitation could allow authenticated remote attackers to add administrator groups to filter subscriptions via a Brok ...

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.20.7 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/admin/ConfigureBatching!default.jspa endpoint. Successful exploitation could allow remote attackers to edit email batch configurations via an Improper Authorization vulnerability.

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.5.10, or 8.6.0 before 8.13.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application which fails to properly handle an issue in the referrer headers which discloses a user's CSRF token. Successful exploitation could allow remote attackers to modify various resources via a cross-site request forgery ( ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.19.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application which fails to properly handle an issue in the Email Template feature used in the Jira Service Management addon. Successful exploitation could allow remote attackers with JIRA Administrators access to execute a ...

The host is installed with Atlassian Jira Server before 8.13.14, or 8.14.0 before 8.19.0 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to properly handle an issue in the GIF Image Reader component. Successful exploitation could allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability.


Pages:      Start    11622    11623    11624    11625    11626    11627    11628    11629    11630    11631    11632    11633    11634    11635    ..   19821

© SecPod Technologies