Show filters
110 Total Results
Displaying 81-90 of 110
Sort by:
Attacker Value
Unknown

CVE-2020-4029

Disclosure Date: July 01, 2020 (last updated November 28, 2024)
The /rest/project-templates/1.0/createshared resource in Atlassian Jira Server and Data Center before version 8.5.5, from 8.6.0 before 8.7.2, and from 8.8.0 before 8.8.1 allows remote attackers to enumerate project names via an improper authorization vulnerability.
Attacker Value
Unknown

CVE-2019-20409

Disclosure Date: June 23, 2020 (last updated February 21, 2025)
The way in which velocity templates were used in Atlassian Jira Server and Data Center prior to version 8.8.0 allowed remote attackers to gain remote code execution if they were able to exploit a server side template injection vulnerability.
Attacker Value
Unknown

CVE-2020-4028

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
Versions before 8.9.1, Various resources in Jira responded with a 404 instead of redirecting unauthenticated users to the login page, in some situations this may have allowed unauthorised attackers to determine if certain resources exist or not through an Information Disclosure vulnerability.
Attacker Value
Unknown

CVE-2020-4021

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.
Attacker Value
Unknown

CVE-2019-20418

Disclosure Date: April 22, 2020 (last updated November 28, 2024)
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to prevent users from accessing the instance via an Application Denial of Service vulnerability in the /rendering/wiki endpoint. The affected versions are before version 8.8.0.
Attacker Value
Unknown

CVE-2019-20898

Disclosure Date: April 22, 2020 (last updated November 28, 2024)
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.
Attacker Value
Unknown

CVE-2020-14172

Disclosure Date: April 22, 2020 (last updated February 21, 2025)
This issue exists to document that a security improvement in the way that Jira Server and Data Center use velocity templates has been implemented. The way in which velocity templates were used in Atlassian Jira Server and Data Center in affected versions allowed remote attackers to achieve remote code execution via insecure deserialization, if they were able to exploit a server side template injection vulnerability. The affected versions are before version 7.13.0, from version 8.0.0 before 8.5.0, and from version 8.6.0 before version 8.8.1.
Attacker Value
Unknown

CVE-2019-20419

Disclosure Date: April 22, 2020 (last updated February 21, 2025)
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to execute arbitrary code via a DLL hijacking vulnerability in Tomcat. The affected versions are before version 8.5.5, and from version 8.6.0 before 8.7.2.
Attacker Value
Unknown

CVE-2019-20413

Disclosure Date: April 08, 2020 (last updated November 28, 2024)
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability on the UserPickerBrowser.jspa page. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.
Attacker Value
Unknown

CVE-2019-20412

Disclosure Date: April 08, 2020 (last updated February 21, 2025)
The Convert Sub-Task to Issue page in affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate the following information via an Improper Authentication vulnerability: Workflow names; Project Key, if it is part of the workflow name; Issue Keys; Issue Types; Status Types. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.