Latest CVE Feed
-
7.5
HIGHCVE-2021-41311
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servle... Read more
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-41310
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustom... Read more
- Published: Nov. 01, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-41309
Affected versions of Atlassian Jira Server and Data Center allow a user who has had their Jira Service Management access revoked to export audit logs of another user's Jira Service Management project via a Broken Authentication vulnerability in the /plugi... Read more
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-41308
Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The a... Read more
- Published: Oct. 26, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41307
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view the names of private projects and private filters via an Insecure Direct Object References (IDOR) vulnerability in the Workload Pie Chart Gadget. The... Read more
- Published: Oct. 26, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41306
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions ... Read more
- Published: Oct. 26, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41305
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. Th... Read more
- Published: Oct. 26, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-41304
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /secure/admin/ImporterFinishedPage.jspa error message. The affected ve... Read more
- Published: Oct. 26, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41303
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.... Read more
- Published: Sep. 17, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-41302
ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-41301
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in au... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41300
ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-41299
ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-41298
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely ... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-41297
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41296
ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-41295
ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-41294
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41293
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and syste... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41292
ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and ... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024