Show filters
320 Total Results
Displaying 171-180 of 320
Sort by:
Attacker Value
Unknown
CVE-2020-9327
Disclosure Date: February 21, 2020 (last updated February 21, 2025)
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
0
Attacker Value
Unknown
CVE-2019-20106
Disclosure Date: February 05, 2020 (last updated February 21, 2025)
Comment properties in Atlassian Jira Server and Data Center before version 7.13.12, from 8.0.0 before version 8.5.4, and 8.6.0 before version 8.6.1 allows remote attackers to make comments on a ticket to which they do not have commenting permissions via a broken access control bug.
0
Attacker Value
Unknown
CVE-2019-20404
Disclosure Date: February 04, 2020 (last updated November 27, 2024)
The API in Atlassian Jira Server and Data Center before version 8.6.0 allows authenticated remote attackers to determine project titles they do not have access to via an improper authorization vulnerability.
0
Attacker Value
Unknown
CVE-2019-20403
Disclosure Date: February 04, 2020 (last updated November 27, 2024)
The API in Atlassian Jira Server and Data Center before version 8.6.0 allows remote attackers to determine if a Jira project key exists or not via an information disclosure vulnerability.
0
Attacker Value
Unknown
CVE-2020-36234
Disclosure Date: February 04, 2020 (last updated February 22, 2025)
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Screens Modal view. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.
0
Attacker Value
Unknown
CVE-2019-20405
Disclosure Date: February 04, 2020 (last updated February 21, 2025)
The JMX monitoring flag in Atlassian Jira Server and Data Center before version 8.6.0 allows remote attackers to turn the JMX monitoring flag off or on via a Cross-site request forgery (CSRF) vulnerability.
0
Attacker Value
Unknown
CVE-2019-20099
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The VerifyPopServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
0
Attacker Value
Unknown
CVE-2019-20098
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The VerifySmtpServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
0
Attacker Value
Unknown
CVE-2019-20100
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
0
Attacker Value
Unknown
CVE-2020-6966
Disclosure Date: January 24, 2020 (last updated February 21, 2025)
In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, the affected products utilize a weak encryption scheme for remote desktop control, which may allow an attacker to obtain remote code execution of devices on the network.
0