CVE-2024-21683
- EPSS 94.05%
- Veröffentlicht 21.05.2024 23:15:07
- Zuletzt bearbeitet 12.05.2025 16:15:20
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute ar...
CVE-2022-26137
- EPSS 0.07%
- Veröffentlicht 20.07.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:53:30
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security...
CVE-2022-26136
- EPSS 0.28%
- Veröffentlicht 20.07.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:53:30
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulner...
CVE-2021-43958
- EPSS 1.28%
- Veröffentlicht 16.03.2022 01:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:05
Various rest resources in Fisheye and Crucible before version 4.8.9 allowed remote attackers to brute force user login credentials as rest resources did not check if users were beyond their max failed login limits and therefore required solving a CAP...
CVE-2021-43957
- EPSS 0.18%
- Veröffentlicht 16.03.2022 01:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:05
Affected versions of Atlassian Fisheye & Crucible allowed remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory and bypass the fix for CVE-2020-29446 due to a lack of url decodin...
CVE-2021-43956
- EPSS 0.37%
- Veröffentlicht 16.03.2022 01:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:04
The jQuery deserialize library in Fisheye and Crucible before version 4.8.9 allowed remote attackers to to inject arbitrary HTML and/or JavaScript via a prototype pollution vulnerability.
CVE-2021-43955
- EPSS 0.18%
- Veröffentlicht 16.03.2022 01:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:04
The /rest-service-fecru/server-v1 resource in Fisheye and Crucible before version 4.8.9 allowed authenticated remote attackers to obtain information about installation directories via information disclosure vulnerability.
CVE-2021-43954
- EPSS 0.14%
- Veröffentlicht 14.03.2022 02:15:08
- Zuletzt bearbeitet 21.11.2024 06:30:04
The DefaultRepositoryAdminService class in Fisheye and Crucible before version 4.8.9 allowed remote attackers, who have 'can add repository permission', to enumerate the existence of internal network and filesystem resources via a Server-Side Request...
CVE-2020-14192
- EPSS 0.2%
- Veröffentlicht 02.02.2021 00:15:12
- Zuletzt bearbeitet 21.11.2024 05:02:50
Affected versions of Atlassian Fisheye and Crucible allow remote attackers to view a product's SEN via an Information Disclosure vulnerability in the x-asen response header from Atlassian Analytics. The affected versions are before version 4.8.4.
CVE-2020-29446
- EPSS 0.39%
- Veröffentlicht 18.01.2021 02:15:13
- Zuletzt bearbeitet 21.11.2024 05:24:01
Affected versions of Atlassian Fisheye & Crucible allow remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory. The affected versions are before version 4.8.5.