Page 3 of 446 results (0.007 seconds)

CVSS: 9.8EPSS: 9%CPEs: 5EXPL: 0

06 Dec 2023 — This vulnerability, if exploited, allows an attacker to perform privileged RCE (Remote Code Execution) on machines with the Assets Discovery agent installed. The vulnerability exists between the Assets Discovery application (formerly known as Insight Discovery) and the Assets Discovery agent. Esta vulnerabilidad, si se explota, permite a un atacante realizar RCE (ejecución remota de código) privilegiada en máquinas con el agente Assets Discovery instalado. La vulnerabilidad existe entre la aplicación Assets... • https://confluence.atlassian.com/security/cve-2023-22523-rce-vulnerability-in-assets-discovery-1319248914.html •

CVSS: 10.0EPSS: 32%CPEs: 2EXPL: 2

06 Dec 2023 — Certain versions of the Atlassian Companion App for MacOS were affected by a remote code execution vulnerability. An attacker could utilize WebSockets to bypass Atlassian Companion’s blocklist and MacOS Gatekeeper to allow execution of code. Ciertas versiones de la aplicación Atlassian Companion para MacOS se vieron afectadas por una vulnerabilidad de ejecución remota de código. Un atacante podría utilizar WebSockets para eludir la lista de bloqueo de Atlassian Companion y MacOS Gatekeeper para permitir la ... • https://github.com/ron-imperva/CVE-2023-22524 •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 0

21 Nov 2023 — This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 8.1.0, 8.2.0, 9.0.0, 9.1.0, 9.2.0, and 9.3.0 of Bamboo Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Bamboo Data Center and Server customers upgrade to late... • https://confluence.atlassian.com/pages/viewpage.action?pageId=1318881573 •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

21 Nov 2023 — This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.6 of Crowd Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.0, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Crowd Data Center and Server customers upgrade to latest version, if you are unable to do so, up... • https://confluence.atlassian.com/pages/viewpage.action?pageId=1318881573 •

CVSS: 10.0EPSS: 94%CPEs: 10EXPL: 9

31 Oct 2023 — All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. Atlassian Cloud sites are not affecte... • https://packetstorm.news/files/id/176264 • CWE-863: Incorrect Authorization •

CVSS: 10.0EPSS: 94%CPEs: 6EXPL: 30

04 Oct 2023 — Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. Atlassian... • https://packetstorm.news/files/id/175225 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 11%CPEs: 10EXPL: 0

19 Sep 2023 — This High severity RCE (Remote Code Execution) vulnerability was introduced in version 8.0.0 of Bitbucket Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Bitbucket Data Center and Server customers upgrade to latest version, if you are unable to d... • https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.0EPSS: 2%CPEs: 2EXPL: 0

18 Jul 2023 — This High severity Injection and RCE (Remote Code Execution) vulnerability known as CVE-2023-22506 was introduced in version 8.0.0 of Bamboo Data Center. This Injection and RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.5, allows an authenticated attacker to modify the actions taken by a system call and execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your ... • https://jira.atlassian.com/browse/BAM-22400 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.0EPSS: 2%CPEs: 6EXPL: 0

18 Jul 2023 — This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22508 was introduced in version 6.1.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to avoid this bug using the following options: * Upg... • https://jira.atlassian.com/browse/CONFSERVER-88221 •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 0

18 Jul 2023 — This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22505 was introduced in version 8.0.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to late... • https://jira.atlassian.com/browse/CONFSERVER-88265 •