Show filters
501 Total Results
Displaying 61-70 of 501
Sort by:
Attacker Value
Unknown
CVE-2023-22501
Disclosure Date: February 01, 2023 (last updated February 24, 2025)
An authentication vulnerability was discovered in Jira Service Management Server and Data Center which allows an attacker to impersonate another user and gain access to a Jira Service Management instance under certain circumstances_._ With write access to a User Directory and outgoing email enabled on a Jira Service Management instance, an attacker could gain access to signup tokens sent to users with accounts that have never been logged into. Access to these tokens can be obtained in two cases:
* If the attacker is included on Jira issues or requests with these users, or
* If the attacker is forwarded or otherwise gains access to emails containing a “View Request” link from these users.
Bot accounts are particularly susceptible to this scenario. On instances with single sign-on, external customer accounts can be affected in projects where anyone can create their own account.
0
Attacker Value
Unknown
CVE-2022-4509
Disclosure Date: January 23, 2023 (last updated October 08, 2023)
The Content Control WordPress plugin before 1.1.10 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high privilege users such as admins.
0
Attacker Value
Unknown
CVE-2022-4381
Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The Popup Maker WordPress plugin before 1.16.9 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
0
Attacker Value
Unknown
CVE-2022-4362
Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The Popup Maker WordPress plugin before 1.16.9 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
0
Attacker Value
Unknown
CVE-2022-3690
Disclosure Date: November 21, 2022 (last updated November 08, 2023)
The Popup Maker WordPress plugin before 1.16.11 does not sanitise and escape some of its Popup options, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks, which could be used against admins
0
Attacker Value
Unknown
CVE-2022-43782
Disclosure Date: November 17, 2022 (last updated November 08, 2023)
Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path.
This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default.
The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3
0
Attacker Value
Unknown
CVE-2022-42978
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
In the Netic User Export add-on before 1.3.5 for Atlassian Confluence, authorization is mishandled. An unauthenticated attacker could access files on the remote system.
0
Attacker Value
Unknown
CVE-2022-42977
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
The Netic User Export add-on before 1.3.5 for Atlassian Confluence has the functionality to generate a list of users in the application, and export it. During export, the HTTP request has a fileName parameter that accepts any file on the system (e.g., an SSH private key) to be downloaded.
0
Attacker Value
Unknown
CVE-2022-2638
Disclosure Date: August 29, 2022 (last updated February 24, 2025)
The Export All URLs WordPress plugin before 4.4 does not validate the path of the file to be removed on the system which is supposed to be the CSV file. This could allow high privilege users to delete arbitrary file from the server
0
Attacker Value
Unknown
CVE-2022-36803
Disclosure Date: August 15, 2022 (last updated February 24, 2025)
The MasterUserEdit API in Atlassian Jira Align Server before version 10.109.2 allows An authenticated attacker with the People role permission to use the MasterUserEdit API to modify any users role to Super Admin. This vulnerability was reported by Jacob Shafer from Bishop Fox.
0