cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-26077,https://securityvulnerability.io/vulnerability/CVE-2021-26077,Broken Authentication in Atlassian Connect Spring Boot by Atlassian,"The vulnerability in Atlassian Connect Spring Boot allows attackers to exploit a flaw in the authentication mechanism. Specifically, versions prior to 2.1.3 and between 2.1.4 and 2.1.5 erroneously accept context JWTs at lifecycle endpoints, where only server-to-server JWTs should be processed. This misconfiguration can enable attackers to execute unauthorized re-installation events within an application, posing significant security risks.",Atlassian,Atlassian Connect Spring Boot (acsb),8.8,HIGH,0.0009899999713525176,false,,false,false,false,,,false,false,,2021-05-10T00:15:00.000Z,0 CVE-2021-26074,https://securityvulnerability.io/vulnerability/CVE-2021-26074,Authentication Flaw in Atlassian Connect Spring Boot by Atlassian,"The Atlassian Connect Spring Boot (ACSB) framework, used for creating Atlassian Connect apps, exhibits a significant security flaw. Versions from 1.1.0 to 2.1.2 incorrectly validate context JSON Web Tokens (JWTs) on lifecycle endpoints intended for server-to-server JWTs only. This misconfiguration allows unauthorized attackers to exploit the flaw, enabling them to send legitimized re-installation events to the app, compromising the integrity of the Atlassian products' authentication mechanisms.",Atlassian,Atlassian Connect Spring Boot (acsb),6.5,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2021-04-16T03:15:00.000Z,0