cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21703,https://securityvulnerability.io/vulnerability/CVE-2024-21703,Confluence Data Center and Server Vulnerability,"This Medium severity Security Misconfiguration vulnerability was introduced in version 8.8.1 of Confluence Data Center and Server for Windows installations. This Security Misconfiguration vulnerability, with a CVSS Score of 6.4 allows an authenticated attacker of the Windows host to read sensitive information about the Confluence Data Center configuration which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.18 * Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.5 * Confluence Data Center and Server 8.7: Upgrade to a release greater than or equal to 8.7.2 * Confluence Data Center and Server 8.8: Upgrade to a release greater than or equal to 8.8.0 See the release notes (https://confluence.atlassian.com/conf88/confluence-release-notes-1354501008.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). This vulnerability was reported via our Atlassian Bug Bounty Program by Chris Elliot.",Atlassian,"Confluence Data Center,Confluence Server",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-27T17:00:01.507Z,0 CVE-2024-21690,https://securityvulnerability.io/vulnerability/CVE-2024-21690,High Severity Reflected XSS and CSRF Vulnerability Affects Atlassian Confluence Products,"The vulnerability allows unauthenticated attackers to execute arbitrary HTML or JavaScript code in the browser of a victim user. This gained access permits attackers to trigger unwanted actions in web applications where the user is currently authenticated, posing significant risks to user confidentiality. The flaw is linked to certain versions of Atlassian Confluence Data Center and Server, which span across major version releases from 7.19.x to 8.9.x. Users are advised to upgrade to specified fixed versions to mitigate potential exploitation. Refer to the release notes for more detailed guidance on upgrading.",Atlassian,"Confluence Data Center,Confluence Server",7.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-21T16:05:00.394Z,0 CVE-2024-21686,https://securityvulnerability.io/vulnerability/CVE-2024-21686,Stored XSS Vulnerability in Confluence Data Center and Server by Atlassian,"A stored cross-site scripting (XSS) vulnerability has been identified in Confluence Data Center and Server, affecting versions 7.13 and earlier. This vulnerability allows an authenticated attacker to inject and execute arbitrary HTML or JavaScript code in the context of a victim's browser. The exploitation of this vulnerability poses significant risks to the confidentiality and integrity of user data, necessitating immediate attention from affected users. Atlassian advises all customers running vulnerable versions to upgrade to the latest version. For users unable to upgrade, migrating to one of the specified fixed versions is strongly recommended. More details and release notes can be found in Atlassian's documentation.",Atlassian,"Confluence Data Center,Confluence Server",8.7,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-07-16T20:15:00.000Z,0 CVE-2024-21676,https://securityvulnerability.io/vulnerability/CVE-2024-21676,High Severity Injection Vulnerability Affects Confluence Data Center,"A recent publication regarding a vulnerability in Atlassian software products has been retracted, citing reasons suggesting it may have been a false positive or error. This incident highlights the importance of vigilant assessment and verification within cybersecurity frameworks to ensure accurate threat identification. Stakeholders are encouraged to stay informed about updates from Atlassian and to continuously evaluate their security measures in light of new findings.",Atlassian,Confluence Data Center,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-16T17:00:00.752Z,0 CVE-2024-21677,https://securityvulnerability.io/vulnerability/CVE-2024-21677,"High Severity Path Traversal Vulnerability Affects Confluence Data Center, Upgrade Recommended","The CVE-2024-21677 is a high severity Path Traversal vulnerability affecting Atlassian's Confluence Data Center and Server. It was introduced in version 6.13.0 and has a CVSS score of 8.3. The vulnerability allows an unauthenticated attacker to exploit it, impacting confidentiality, integrity, and availability. Atlassian recommends upgrading to the latest version or to a supported fixed version to address this vulnerability. There is no indication of exploitation by ransomware groups at this time.",Atlassian,Confluence Data Center,8.3,HIGH,0.0004299999854993075,false,,true,false,false,,,false,false,,2024-03-19T17:00:00.486Z,0 CVE-2024-21678,https://securityvulnerability.io/vulnerability/CVE-2024-21678,Stored XSS Vulnerability in Confluence Data Center by Atlassian,"A Stored XSS vulnerability was introduced in version 2.7.0 of Confluence Data Center, allowing an authenticated attacker to execute arbitrary HTML or JavaScript code in the context of a victim's browser. This vulnerability potentially compromises user confidentiality, affecting data privacy and security. The issue has been reported through Atlassian's Bug Bounty program, prompting the vendor to recommend immediate upgrades to fixed versions to mitigate risks. Users are strongly advised to update to the latest available versions to protect against possible exploits.",Atlassian,Confluence Data Center,8.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-20T18:00:00.727Z,0 CVE-2024-21673,https://securityvulnerability.io/vulnerability/CVE-2024-21673,Remote Code Execution Vulnerability in Confluence Data Center and Server by Atlassian,"A notable Remote Code Execution (RCE) vulnerability has been identified in Atlassian's Confluence Data Center and Server, originating from versions 7.13.0 and onwards. This vulnerability allows authenticated attackers to execute arbitrary code remotely, leading to severe risks regarding the confidentiality, integrity, and availability of the affected systems. Notably, the intrusion does not necessitate user interaction, which heightens the risk of unauthorized access to sensitive assets. To mitigate these risks, users are strongly advised to upgrade to the latest supported versions of Confluence, namely 7.19.18 or higher for the 7.19 series, 8.5.5 or higher for the 8.5 series, and 8.7.2 or higher for the 8.7 series. Further details can be found in the Atlassian release notes.",Atlassian,"Confluence Data Center,Confluence Server",8,HIGH,0.002369999885559082,false,,false,false,false,,,false,false,,2024-01-16T05:00:00.724Z,0 CVE-2024-21672,https://securityvulnerability.io/vulnerability/CVE-2024-21672,Remote Code Execution Vulnerability in Atlassian Confluence Data Center and Server,"A remote code execution vulnerability exists within Atlassian Confluence Data Center and Server, initially introduced in version 2.1.0. This flaw permits an unauthenticated attacker to exploit exposed assets in the affected environment, posing significant risks to confidentiality, integrity, and availability. The vulnerability necessitates user interaction to trigger the exploit, emphasizing the importance of prompt action. Atlassian recommends upgrading to the latest version or specific supported fixed versions for enhanced security. Users of the Confluence Data Center and Server should prioritize these upgrades to mitigate potential security risks.",Atlassian,"Confluence Data Center,Confluence Server",8.3,HIGH,0.0026499999221414328,false,,false,false,true,2024-03-02T05:42:59.000Z,true,false,false,,2024-01-16T05:00:00.703Z,0 CVE-2023-22527,https://securityvulnerability.io/vulnerability/CVE-2023-22527,Unauthorized Remote Code Execution Vulnerability Affects Older Versions of Confluence,"A template injection vulnerability exists in older versions of Confluence Data Center and Server, allowing unauthenticated attackers to execute remote code on affected instances. This vulnerability underscores the necessity for users to upgrade to the most recent supported versions, which have been patched against such vulnerabilities. Atlassian has strongly advised customers to promptly apply security updates as outlined in their January Security Bulletin to protect against potential threats. Maintaining an up-to-date environment is crucial to ensure system integrity and safeguard against emerging security risks.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9723100066184998,true,2024-01-24T00:00:00.000Z,true,true,true,2024-01-23T16:30:00.000Z,true,true,true,2024-01-23T21:52:02.231Z,2024-01-16T05:00:00.692Z,19235 CVE-2024-21674,https://securityvulnerability.io/vulnerability/CVE-2024-21674,Remote Code Execution Vulnerability in Confluence Data Center and Server by Atlassian,"A Remote Code Execution vulnerability exists within Atlassian's Confluence Data Center and Server, introduced in version 7.13.0. This flaw enables unauthenticated attackers to execute arbitrary code, potentially exposing sensitive assets within a user's environment. The vulnerability predominantly affects confidentiality, leaving integrity and availability intact, and does not require any user interaction for exploitation. To mitigate risks associated with CVE-2024-21674, it is crucial for users to upgrade to specific versions as recommended by Atlassian, ensuring their systems are safeguarded against potential threats.",Atlassian,"Confluence Data Center,Confluence Server",7.5,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-01-16T05:00:00.639Z,0 CVE-2023-22526,https://securityvulnerability.io/vulnerability/CVE-2023-22526,Remote Code Execution Vulnerability in Atlassian Confluence Data Center,"A significant Remote Code Execution (RCE) vulnerability exists in specific versions of Atlassian Confluence Data Center, which allows authenticated attackers to execute arbitrary code without requiring user interaction. This vulnerability poses substantial risks to the confidentiality, integrity, and availability of affected systems. Users are strongly advised to upgrade to the latest versions or the specified fixed releases to mitigate potential threats. More information on the latest upgrades can be found through the Atlassian release notes.",Atlassian,Confluence Data Center,8.8,HIGH,0.0025500000920146704,false,,false,false,false,,,false,false,,2024-01-16T05:00:00.597Z,0 CVE-2023-22522,https://securityvulnerability.io/vulnerability/CVE-2023-22522,Template Injection Vulnerability in Atlassian Confluence Server and Data Center,"A Template Injection vulnerability exists in Atlassian Confluence which allows an authenticated user, even with anonymous access, to inject harmful user input into Confluence pages. This can lead to Remote Code Execution (RCE), putting affected instances at risk. Notably, Confluence Data Center and Server versions are susceptible, while Atlassian Cloud sites are not impacted by this issue. Administrators should evaluate their environments and apply the necessary patches as per the provided advisory for enhanced security.",Atlassian,"Confluence Data Center,Confluence Server",9,CRITICAL,0.0020000000949949026,false,,true,false,true,2023-12-06T14:51:33.000Z,,false,false,,2023-12-06T05:15:00.000Z,0 CVE-2023-22518,https://securityvulnerability.io/vulnerability/CVE-2023-22518,"Unexexploited Vulnerability Affects Confluence Data Center and Server, Leading to Full Loss of Confidentiality, Integrity, and Availability","A significant vulnerability affecting all versions of Atlassian Confluence Data Center and Server allows unauthenticated attackers to exploit an improper authorization flaw. This vulnerability enables the creation of a Confluence instance administrator account, granting unauthorized users extensive administrative privileges. Once access is obtained, attackers can execute a variety of administrative actions within the affected system. The implications of this vulnerability are severe, potentially resulting in a complete compromise of confidentiality, integrity, and availability of the Confluence environment. It is crucial to note that sites hosted on atlassian.net are not affected by this risk.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9699100255966187,true,2023-11-07T00:00:00.000Z,true,true,true,2023-11-03T10:25:00.000Z,true,false,false,,2023-10-31T15:15:00.000Z,0 CVE-2023-22515,https://securityvulnerability.io/vulnerability/CVE-2023-22515,"Unknown Vulnerability Affects Confluence instances, External Attackers May Create Unauthorized Admin Accounts","Atlassian has identified a vulnerability in its Confluence Data Center and Server products that allows external attackers to create unauthorized administrator accounts. This issue could enable malicious actors to gain unrestricted access to Confluence instances that are publicly accessible. It is important to note that Confluence Cloud sites, hosted under an atlassian.net domain, remain unaffected by this vulnerability. Organizations using the affected versions should address this security risk promptly to safeguard their data.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9700300097465515,true,2023-10-05T00:00:00.000Z,true,true,true,2023-10-04T20:46:01.000Z,true,false,false,,2023-10-04T14:15:00.000Z,0 CVE-2023-22508,https://securityvulnerability.io/vulnerability/CVE-2023-22508,Remote Code Execution Vulnerability in Atlassian Confluence Data Center & Server,"A remote code execution vulnerability in Atlassian Confluence Data Center & Server allows authenticated attackers to execute arbitrary code without user interaction. To mitigate the risk, upgrading to versions 8.2.0 or higher, or specific LTS releases is strongly recommended. If immediate upgrade is not feasible, alternative workarounds are available to disable the JMX network port. This vulnerability, discovered through Atlassian's Bug Bounty program, poses significant risks to the confidentiality, integrity, and availability of affected systems.",Atlassian,"Confluence Data Center,Confluence Server",8.8,HIGH,0.0016599999507889152,false,,false,false,false,,,false,false,,2023-07-18T23:15:00.000Z,0 CVE-2023-22505,https://securityvulnerability.io/vulnerability/CVE-2023-22505,RCE Vulnerability in Confluence Data Center & Server by Atlassian,"A Remote Code Execution vulnerability has been identified in versions of Confluence Data Center & Server starting from 8.0.0. This flaw enables an authenticated attacker to run arbitrary code without user interaction, potentially compromising confidentiality, integrity, and availability of the system. Atlassian strongly advises users to upgrade to the latest version to mitigate risks associated with this vulnerability. If immediate upgrading is not feasible, users should update to fixed versions 8.3.2 or 8.4.0 as detailed in the official release notes.",Atlassian,"Confluence Data Center,Confluence Server",8,HIGH,0.0016599999507889152,false,,false,false,false,,,false,false,,2023-07-18T21:15:00.000Z,0 CVE-2023-22504,https://securityvulnerability.io/vulnerability/CVE-2023-22504,Broken Access Control in Atlassian Confluence Server Affects Remote Users,"A flaw in Atlassian Confluence Server allows remote attackers with read permissions to upload attachments despite lacking write permissions. This Broken Access Control vulnerability poses a risk by enabling unauthorized manipulation of file uploads, potentially leading to further exploitation.",Atlassian,"Confluence Data Center,Confluence Server",4.3,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2023-05-25T14:15:00.000Z,0 CVE-2023-22503,https://securityvulnerability.io/vulnerability/CVE-2023-22503,Information Disclosure Vulnerability in Atlassian Confluence Server and Data Center,"An information disclosure vulnerability exists in Atlassian Confluence Server and Data Center that allows unauthorized anonymous users to view private space details. Specifically, this flaw enables attackers to access the names of attachments and labels belonging to private Confluence spaces through the macro preview feature. The issue impacts versions of Confluence prior to 7.13.15, 7.14.0 through 7.19.7, and 7.20.0 through 8.2.0, potentially exposing sensitive data to unauthorized individuals.",Atlassian,"Confluence Data Center,Confluence Server",5.3,MEDIUM,0.0010100000072270632,false,,false,false,false,,,false,false,,2023-05-01T17:15:00.000Z,0 CVE-2022-42977,https://securityvulnerability.io/vulnerability/CVE-2022-42977,File Download Vulnerability in Atlassian Confluence User Export Add-on,"The Netic User Export add-on for Atlassian Confluence, prior to version 1.3.5, contains a vulnerability that permits an attacker to exploit the fileName parameter during user export operations. This flaw could allow unauthorized users to generate and download files from the system, including sensitive information such as SSH private keys, thereby posing significant risks to the security and confidentiality of the application.",Atlassian,Confluence Data Center,7.5,HIGH,0.0017399999778717756,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-42978,https://securityvulnerability.io/vulnerability/CVE-2022-42978,Authorization Mishandling in Netic User Export for Atlassian Confluence,"The Netic User Export add-on for Atlassian Confluence prior to version 1.3.5 suffers from a vulnerability where authorization checks are mishandled. This weakness allows unauthenticated users to potentially access sensitive files on the remote Confluence server, posing a significant security risk to organizations utilizing this add-on. Proper authorization checks are essential to safeguard against unauthorized access and protect confidential data.",Atlassian,Confluence Data Center,7.5,HIGH,0.002219999907538295,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2020-36290,https://securityvulnerability.io/vulnerability/CVE-2020-36290,Cross-Site Scripting Vulnerability in Confluence Server and Data Center,"The Livesearch macro in Confluence Server and Data Center allows remote attackers who have edit permissions for a page or blog to exploit an XSS vulnerability. This enables the injection of arbitrary HTML or JavaScript via the page excerpt functionality, potentially compromising the security of the application and its users.",Atlassian,"Confluence Server,Confluence Data Center",5.4,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2022-07-26T00:00:00.000Z,0 CVE-2022-26136,https://securityvulnerability.io/vulnerability/CVE-2022-26136,Remote Authentication Bypass Vulnerability in Atlassian Products,"A vulnerability affecting various Atlassian products allows an unauthenticated remote attacker to bypass Servlet Filters utilized by both first and third party applications. The potential impact varies based on the specific filters employed by the applications, leading to possible authentication bypass and cross-site scripting (XSS) exploits. While Atlassian has deployed updates to address the root cause, the comprehensive implications of this vulnerability may not be fully disclosed, highlighting the importance of applying the latest security updates.",Atlassian,"Bamboo Server,Bamboo Data Center,Bitbucket Server,Bitbucket Data Center,Confluence Server,Confluence Data Center,Crowd Server,Crowd Data Center,Crucible,Fisheye,Jira Core Server,Jira Software Server,Jira Software Data Center,Jira Service Management Server,Jira Service Management Data Center",9.8,CRITICAL,0.008580000139772892,false,,false,false,false,,,false,false,,2022-07-20T00:00:00.000Z,0 CVE-2022-26137,https://securityvulnerability.io/vulnerability/CVE-2022-26137,CORS Bypass Vulnerability in Atlassian Products,"A vulnerability in multiple Atlassian products enables a remote attacker to exploit Cross-origin resource sharing (CORS) by sending specially crafted HTTP requests. This can result in unauthorized access to vulnerable applications, permitting the attacker to utilize the permissions of a tricked user who visits a malicious URL. Affected versions of products, including Bamboo, Bitbucket, Confluence, Crowd, Fisheye, Crucible, Jira, and Jira Service Management, must be updated to mitigate this risk.",Atlassian,"Bamboo Server,Bamboo Data Center,Bitbucket Server,Bitbucket Data Center,Confluence Server,Confluence Data Center,Crowd Server,Crowd Data Center,Crucible,Fisheye,Jira Core Server,Jira Software Server,Jira Software Data Center,Jira Service Management Server,Jira Service Management Data Center",8.8,HIGH,0.003659999929368496,false,,false,false,false,,,false,false,,2022-07-20T00:00:00.000Z,0 CVE-2022-26138,https://securityvulnerability.io/vulnerability/CVE-2022-26138,Vulnerability in Atlassian Questions For Confluence App for Confluence Server and Data Center,"The Atlassian Questions For Confluence app vulnerabilities allow the creation of a user account named 'disabledsystemuser' with a hardcoded password upon installation of specific app versions. An unauthenticated attacker who is aware of this password can exploit this flaw to gain unauthorized access to Confluence, potentially leading to unauthorized viewing of all content available to users in the confluence-users group. This issue poses a significant risk to the security and integrity of user data in Confluence environments.",Atlassian,Questions For Confluence,9.8,CRITICAL,0.9681500196456909,true,2022-07-29T00:00:00.000Z,false,false,true,2022-07-29T00:00:00.000Z,true,false,false,,2022-07-20T00:00:00.000Z,0 CVE-2022-26134,https://securityvulnerability.io/vulnerability/CVE-2022-26134,OGNL Injection Vulnerability in Confluence Server and Data Center by Atlassian,"An OGNL injection vulnerability exists in Confluence Server and Data Center, allowing unauthenticated attackers to execute arbitrary code on affected instances. Versions earlier than 7.4.17, and specific ranges of 7.13.x, 7.14.x, 7.15.x, 7.16.x, 7.17.x, and 7.18.x, are vulnerable. This security issue poses significant risks to the integrity and confidentiality of the data managed within impacted systems.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9735000133514404,true,2022-06-02T00:00:00.000Z,false,true,true,2022-06-02T00:00:00.000Z,true,false,false,,2022-06-03T22:15:00.000Z,0