Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
atlassian jira 4.4.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-52240
The Kantega SAML SSO OIDC Kerberos Single Sign-on apps prior to 6.20.0 for Atlassian products allow XSS if SAML POST Binding is enabled. This affects 4.4.2 up to and including 4.14.8 prior to 4.14.9, 5.0.0 up to and including 5.11.4 prior to 5.11.5, and 6.0.0 up to and including ...
Kantega-sso Kantega Saml Sso Oidc Kerberos Single Sign-on
NA
CVE-2022-26136
A vulnerability in multiple Atlassian products allows a remote, unauthenticated malicious user to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in au...
Atlassian Confluence Data Center 7.18.0
Atlassian Confluence Data Center
Atlassian Confluence Server 7.18.0
Atlassian Confluence Server
Atlassian Bitbucket 8.0.0
Atlassian Bitbucket 8.1.0
Atlassian Crowd
Atlassian Crowd 5.0.0
Atlassian Crucible
Atlassian Fisheye
Atlassian Jira Data Center
Atlassian Jira Server
Atlassian Jira Service Management
Atlassian Bamboo
Atlassian Bitbucket
Atlassian Jira Service Desk
1 Article
NA
CVE-2022-26137
A vulnerability in multiple Atlassian products allows a remote, unauthenticated malicious user to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with t...
Atlassian Confluence Data Center 7.18.0
Atlassian Confluence Data Center
Atlassian Confluence Server 7.18.0
Atlassian Confluence Server
Atlassian Bitbucket 8.0.0
Atlassian Bitbucket 8.1.0
Atlassian Crowd
Atlassian Crowd 5.0.0
Atlassian Crucible
Atlassian Fisheye
Atlassian Jira Data Center
Atlassian Jira Server
Atlassian Jira Service Management
Atlassian Bamboo
Atlassian Bitbucket
Atlassian Jira Service Desk
1 Article
7.5
CVSSv2
CVE-2017-5983
The JIRA Workflow Designer Plugin in Atlassian JIRA Server prior to 6.3.0 improperly uses an XML parser and deserializer, which allows remote malicious users to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object.
Atlassian Jira 4.2.4
Atlassian Jira 5.0.2
Atlassian Jira 5.0.3
Atlassian Jira 5.0.4
Atlassian Jira 5.0.5
Atlassian Jira 5.2.3
Atlassian Jira 5.2.4
Atlassian Jira 5.2.5
Atlassian Jira 5.2.6
Atlassian Jira 6.0.8
Atlassian Jira 6.1
Atlassian Jira 6.1.1
Atlassian Jira 6.1.2
Atlassian Jira 6.2.6
Atlassian Jira 6.2.7
Atlassian Jira 4.3.4
Atlassian Jira 4.4
Atlassian Jira 4.4.1
Atlassian Jira 4.4.2
Atlassian Jira 4.4.3
Atlassian Jira 5.1.3
Atlassian Jira 5.1.4
4
CVSSv2
CVE-2012-2927
The TM Software Tempo plugin prior to 6.4.3.1, 6.5.x prior to 6.5.0.2, and 7.x prior to 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via...
Tm Software Tempo 2.4.1
Tm Software Tempo 2.5.1
Tm Software Tempo 2.8.1
Tm Software Tempo 4.3
Tm Software Tempo 2.2
Tm Software Tempo 4.0
Tm Software Tempo 4.0.1
Tm Software Tempo 4.5
Tm Software Tempo 4.5.2
Tm Software Tempo 5.0
Tm Software Tempo 2.6.1
Tm Software Tempo 2.7.1
Tm Software Tempo 4.4
Tm Software Tempo 4.4.2
Tm Software Tempo 5.2.2
Tm Software Tempo 5.2.3
Tm Software Tempo 5.4.2
Tm Software Tempo 6.0.0
Tm Software Tempo 6.2.1-jira42
Tm Software Tempo 6.2.2
Tm Software Tempo 6.2.3
Tm Software Tempo6.3.2 Jira42
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started