cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21703,https://securityvulnerability.io/vulnerability/CVE-2024-21703,Confluence Data Center and Server Vulnerability,"This Medium severity Security Misconfiguration vulnerability was introduced in version 8.8.1 of Confluence Data Center and Server for Windows installations. This Security Misconfiguration vulnerability, with a CVSS Score of 6.4 allows an authenticated attacker of the Windows host to read sensitive information about the Confluence Data Center configuration which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.18 * Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.5 * Confluence Data Center and Server 8.7: Upgrade to a release greater than or equal to 8.7.2 * Confluence Data Center and Server 8.8: Upgrade to a release greater than or equal to 8.8.0 See the release notes (https://confluence.atlassian.com/conf88/confluence-release-notes-1354501008.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). This vulnerability was reported via our Atlassian Bug Bounty Program by Chris Elliot.",Atlassian,"Confluence Data Center,Confluence Server",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-27T17:00:01.507Z,0 CVE-2024-21690,https://securityvulnerability.io/vulnerability/CVE-2024-21690,High Severity Reflected XSS and CSRF Vulnerability Affects Atlassian Confluence Products,"The vulnerability allows unauthenticated attackers to execute arbitrary HTML or JavaScript code in the browser of a victim user. This gained access permits attackers to trigger unwanted actions in web applications where the user is currently authenticated, posing significant risks to user confidentiality. The flaw is linked to certain versions of Atlassian Confluence Data Center and Server, which span across major version releases from 7.19.x to 8.9.x. Users are advised to upgrade to specified fixed versions to mitigate potential exploitation. Refer to the release notes for more detailed guidance on upgrading.",Atlassian,"Confluence Data Center,Confluence Server",7.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-21T16:05:00.394Z,0 CVE-2024-21686,https://securityvulnerability.io/vulnerability/CVE-2024-21686,Stored XSS Vulnerability in Confluence Data Center and Server by Atlassian,"A stored cross-site scripting (XSS) vulnerability has been identified in Confluence Data Center and Server, affecting versions 7.13 and earlier. This vulnerability allows an authenticated attacker to inject and execute arbitrary HTML or JavaScript code in the context of a victim's browser. The exploitation of this vulnerability poses significant risks to the confidentiality and integrity of user data, necessitating immediate attention from affected users. Atlassian advises all customers running vulnerable versions to upgrade to the latest version. For users unable to upgrade, migrating to one of the specified fixed versions is strongly recommended. More details and release notes can be found in Atlassian's documentation.",Atlassian,"Confluence Data Center,Confluence Server",8.7,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-07-16T20:15:00.000Z,0 CVE-2024-21673,https://securityvulnerability.io/vulnerability/CVE-2024-21673,Remote Code Execution Vulnerability in Confluence Data Center and Server by Atlassian,"A notable Remote Code Execution (RCE) vulnerability has been identified in Atlassian's Confluence Data Center and Server, originating from versions 7.13.0 and onwards. This vulnerability allows authenticated attackers to execute arbitrary code remotely, leading to severe risks regarding the confidentiality, integrity, and availability of the affected systems. Notably, the intrusion does not necessitate user interaction, which heightens the risk of unauthorized access to sensitive assets. To mitigate these risks, users are strongly advised to upgrade to the latest supported versions of Confluence, namely 7.19.18 or higher for the 7.19 series, 8.5.5 or higher for the 8.5 series, and 8.7.2 or higher for the 8.7 series. Further details can be found in the Atlassian release notes.",Atlassian,"Confluence Data Center,Confluence Server",8,HIGH,0.002369999885559082,false,,false,false,false,,,false,false,,2024-01-16T05:00:00.724Z,0 CVE-2024-21672,https://securityvulnerability.io/vulnerability/CVE-2024-21672,Remote Code Execution Vulnerability in Atlassian Confluence Data Center and Server,"A remote code execution vulnerability exists within Atlassian Confluence Data Center and Server, initially introduced in version 2.1.0. This flaw permits an unauthenticated attacker to exploit exposed assets in the affected environment, posing significant risks to confidentiality, integrity, and availability. The vulnerability necessitates user interaction to trigger the exploit, emphasizing the importance of prompt action. Atlassian recommends upgrading to the latest version or specific supported fixed versions for enhanced security. Users of the Confluence Data Center and Server should prioritize these upgrades to mitigate potential security risks.",Atlassian,"Confluence Data Center,Confluence Server",8.3,HIGH,0.0026499999221414328,false,,false,false,true,2024-03-02T05:42:59.000Z,true,false,false,,2024-01-16T05:00:00.703Z,0 CVE-2023-22527,https://securityvulnerability.io/vulnerability/CVE-2023-22527,Unauthorized Remote Code Execution Vulnerability Affects Older Versions of Confluence,"A template injection vulnerability exists in older versions of Confluence Data Center and Server, allowing unauthenticated attackers to execute remote code on affected instances. This vulnerability underscores the necessity for users to upgrade to the most recent supported versions, which have been patched against such vulnerabilities. Atlassian has strongly advised customers to promptly apply security updates as outlined in their January Security Bulletin to protect against potential threats. Maintaining an up-to-date environment is crucial to ensure system integrity and safeguard against emerging security risks.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9723100066184998,true,2024-01-24T00:00:00.000Z,true,true,true,2024-01-23T16:30:00.000Z,true,true,true,2024-01-23T21:52:02.231Z,2024-01-16T05:00:00.692Z,19235 CVE-2024-21674,https://securityvulnerability.io/vulnerability/CVE-2024-21674,Remote Code Execution Vulnerability in Confluence Data Center and Server by Atlassian,"A Remote Code Execution vulnerability exists within Atlassian's Confluence Data Center and Server, introduced in version 7.13.0. This flaw enables unauthenticated attackers to execute arbitrary code, potentially exposing sensitive assets within a user's environment. The vulnerability predominantly affects confidentiality, leaving integrity and availability intact, and does not require any user interaction for exploitation. To mitigate risks associated with CVE-2024-21674, it is crucial for users to upgrade to specific versions as recommended by Atlassian, ensuring their systems are safeguarded against potential threats.",Atlassian,"Confluence Data Center,Confluence Server",7.5,HIGH,0.0022100000642240047,false,,false,false,false,,,false,false,,2024-01-16T05:00:00.639Z,0 CVE-2023-22522,https://securityvulnerability.io/vulnerability/CVE-2023-22522,Template Injection Vulnerability in Atlassian Confluence Server and Data Center,"A Template Injection vulnerability exists in Atlassian Confluence which allows an authenticated user, even with anonymous access, to inject harmful user input into Confluence pages. This can lead to Remote Code Execution (RCE), putting affected instances at risk. Notably, Confluence Data Center and Server versions are susceptible, while Atlassian Cloud sites are not impacted by this issue. Administrators should evaluate their environments and apply the necessary patches as per the provided advisory for enhanced security.",Atlassian,"Confluence Data Center,Confluence Server",9,CRITICAL,0.0020000000949949026,false,,true,false,true,2023-12-06T14:51:33.000Z,,false,false,,2023-12-06T05:15:00.000Z,0 CVE-2023-22518,https://securityvulnerability.io/vulnerability/CVE-2023-22518,"Unexexploited Vulnerability Affects Confluence Data Center and Server, Leading to Full Loss of Confidentiality, Integrity, and Availability","A significant vulnerability affecting all versions of Atlassian Confluence Data Center and Server allows unauthenticated attackers to exploit an improper authorization flaw. This vulnerability enables the creation of a Confluence instance administrator account, granting unauthorized users extensive administrative privileges. Once access is obtained, attackers can execute a variety of administrative actions within the affected system. The implications of this vulnerability are severe, potentially resulting in a complete compromise of confidentiality, integrity, and availability of the Confluence environment. It is crucial to note that sites hosted on atlassian.net are not affected by this risk.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9699100255966187,true,2023-11-07T00:00:00.000Z,true,true,true,2023-11-03T10:25:00.000Z,true,false,false,,2023-10-31T15:15:00.000Z,0 CVE-2023-22515,https://securityvulnerability.io/vulnerability/CVE-2023-22515,"Unknown Vulnerability Affects Confluence instances, External Attackers May Create Unauthorized Admin Accounts","Atlassian has identified a vulnerability in its Confluence Data Center and Server products that allows external attackers to create unauthorized administrator accounts. This issue could enable malicious actors to gain unrestricted access to Confluence instances that are publicly accessible. It is important to note that Confluence Cloud sites, hosted under an atlassian.net domain, remain unaffected by this vulnerability. Organizations using the affected versions should address this security risk promptly to safeguard their data.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9700300097465515,true,2023-10-05T00:00:00.000Z,true,true,true,2023-10-04T20:46:01.000Z,true,false,false,,2023-10-04T14:15:00.000Z,0 CVE-2023-22508,https://securityvulnerability.io/vulnerability/CVE-2023-22508,Remote Code Execution Vulnerability in Atlassian Confluence Data Center & Server,"A remote code execution vulnerability in Atlassian Confluence Data Center & Server allows authenticated attackers to execute arbitrary code without user interaction. To mitigate the risk, upgrading to versions 8.2.0 or higher, or specific LTS releases is strongly recommended. If immediate upgrade is not feasible, alternative workarounds are available to disable the JMX network port. This vulnerability, discovered through Atlassian's Bug Bounty program, poses significant risks to the confidentiality, integrity, and availability of affected systems.",Atlassian,"Confluence Data Center,Confluence Server",8.8,HIGH,0.0016599999507889152,false,,false,false,false,,,false,false,,2023-07-18T23:15:00.000Z,0 CVE-2023-22505,https://securityvulnerability.io/vulnerability/CVE-2023-22505,RCE Vulnerability in Confluence Data Center & Server by Atlassian,"A Remote Code Execution vulnerability has been identified in versions of Confluence Data Center & Server starting from 8.0.0. This flaw enables an authenticated attacker to run arbitrary code without user interaction, potentially compromising confidentiality, integrity, and availability of the system. Atlassian strongly advises users to upgrade to the latest version to mitigate risks associated with this vulnerability. If immediate upgrading is not feasible, users should update to fixed versions 8.3.2 or 8.4.0 as detailed in the official release notes.",Atlassian,"Confluence Data Center,Confluence Server",8,HIGH,0.0016599999507889152,false,,false,false,false,,,false,false,,2023-07-18T21:15:00.000Z,0 CVE-2023-22504,https://securityvulnerability.io/vulnerability/CVE-2023-22504,Broken Access Control in Atlassian Confluence Server Affects Remote Users,"A flaw in Atlassian Confluence Server allows remote attackers with read permissions to upload attachments despite lacking write permissions. This Broken Access Control vulnerability poses a risk by enabling unauthorized manipulation of file uploads, potentially leading to further exploitation.",Atlassian,"Confluence Data Center,Confluence Server",4.3,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2023-05-25T14:15:00.000Z,0 CVE-2023-22503,https://securityvulnerability.io/vulnerability/CVE-2023-22503,Information Disclosure Vulnerability in Atlassian Confluence Server and Data Center,"An information disclosure vulnerability exists in Atlassian Confluence Server and Data Center that allows unauthorized anonymous users to view private space details. Specifically, this flaw enables attackers to access the names of attachments and labels belonging to private Confluence spaces through the macro preview feature. The issue impacts versions of Confluence prior to 7.13.15, 7.14.0 through 7.19.7, and 7.20.0 through 8.2.0, potentially exposing sensitive data to unauthorized individuals.",Atlassian,"Confluence Data Center,Confluence Server",5.3,MEDIUM,0.0010100000072270632,false,,false,false,false,,,false,false,,2023-05-01T17:15:00.000Z,0 CVE-2020-36290,https://securityvulnerability.io/vulnerability/CVE-2020-36290,Cross-Site Scripting Vulnerability in Confluence Server and Data Center,"The Livesearch macro in Confluence Server and Data Center allows remote attackers who have edit permissions for a page or blog to exploit an XSS vulnerability. This enables the injection of arbitrary HTML or JavaScript via the page excerpt functionality, potentially compromising the security of the application and its users.",Atlassian,"Confluence Server,Confluence Data Center",5.4,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2022-07-26T00:00:00.000Z,0 CVE-2022-26137,https://securityvulnerability.io/vulnerability/CVE-2022-26137,CORS Bypass Vulnerability in Atlassian Products,"A vulnerability in multiple Atlassian products enables a remote attacker to exploit Cross-origin resource sharing (CORS) by sending specially crafted HTTP requests. This can result in unauthorized access to vulnerable applications, permitting the attacker to utilize the permissions of a tricked user who visits a malicious URL. Affected versions of products, including Bamboo, Bitbucket, Confluence, Crowd, Fisheye, Crucible, Jira, and Jira Service Management, must be updated to mitigate this risk.",Atlassian,"Bamboo Server,Bamboo Data Center,Bitbucket Server,Bitbucket Data Center,Confluence Server,Confluence Data Center,Crowd Server,Crowd Data Center,Crucible,Fisheye,Jira Core Server,Jira Software Server,Jira Software Data Center,Jira Service Management Server,Jira Service Management Data Center",8.8,HIGH,0.003659999929368496,false,,false,false,false,,,false,false,,2022-07-20T00:00:00.000Z,0 CVE-2022-26136,https://securityvulnerability.io/vulnerability/CVE-2022-26136,Remote Authentication Bypass Vulnerability in Atlassian Products,"A vulnerability affecting various Atlassian products allows an unauthenticated remote attacker to bypass Servlet Filters utilized by both first and third party applications. The potential impact varies based on the specific filters employed by the applications, leading to possible authentication bypass and cross-site scripting (XSS) exploits. While Atlassian has deployed updates to address the root cause, the comprehensive implications of this vulnerability may not be fully disclosed, highlighting the importance of applying the latest security updates.",Atlassian,"Bamboo Server,Bamboo Data Center,Bitbucket Server,Bitbucket Data Center,Confluence Server,Confluence Data Center,Crowd Server,Crowd Data Center,Crucible,Fisheye,Jira Core Server,Jira Software Server,Jira Software Data Center,Jira Service Management Server,Jira Service Management Data Center",9.8,CRITICAL,0.008580000139772892,false,,false,false,false,,,false,false,,2022-07-20T00:00:00.000Z,0 CVE-2022-26134,https://securityvulnerability.io/vulnerability/CVE-2022-26134,OGNL Injection Vulnerability in Confluence Server and Data Center by Atlassian,"An OGNL injection vulnerability exists in Confluence Server and Data Center, allowing unauthenticated attackers to execute arbitrary code on affected instances. Versions earlier than 7.4.17, and specific ranges of 7.13.x, 7.14.x, 7.15.x, 7.16.x, 7.17.x, and 7.18.x, are vulnerable. This security issue poses significant risks to the integrity and confidentiality of the data managed within impacted systems.",Atlassian,"Confluence Data Center,Confluence Server",9.8,CRITICAL,0.9735000133514404,true,2022-06-02T00:00:00.000Z,false,true,true,2022-06-02T00:00:00.000Z,true,false,false,,2022-06-03T22:15:00.000Z,0 CVE-2021-39114,https://securityvulnerability.io/vulnerability/CVE-2021-39114,Code Execution Vulnerability in Atlassian Confluence Server and Data Center,"Atlassian Confluence Server and Data Center versions prior to specified updates permit users with valid accounts to inject OGNL payloads, enabling the execution of arbitrary Java code or system commands. This vulnerability impacts versions before 6.13.23, as well as certain versions in the 6.14.x, 7.5.x, 7.11.x, and 7.12.x series. Users are encouraged to update their installations to mitigate any potential risks associated with this vulnerability.",Atlassian,"Confluence Server,Confluence Data Center",8.8,HIGH,0.0009800000116229057,false,,false,false,false,,,false,false,,2022-04-05T04:15:00.000Z,0 CVE-2021-43940,https://securityvulnerability.io/vulnerability/CVE-2021-43940,DLL Hijacking Vulnerability in Atlassian Confluence Server and Data Center,"A security issue exists in Atlassian Confluence Server and Data Center on Windows that permits authenticated local attackers to escalate privileges via a DLL Hijacking vulnerability within the installer. This flaw primarily affects installations of Confluence prior to version 7.4.10 and between versions 7.5.0 and 7.12.3. Attackers can leverage this vulnerability to manipulate DLL files, gaining unauthorized access and control over the system.",Atlassian,"Confluence Server,Confluence Data Center",7.8,HIGH,0.000590000010561198,false,,false,false,false,,,false,false,,2022-02-15T04:15:00.000Z,0 CVE-2021-26084,https://securityvulnerability.io/vulnerability/CVE-2021-26084,OGNL Injection Vulnerability in Confluence Server and Data Center by Atlassian,"A vulnerability in Confluence Server and Data Center allows an unauthenticated attacker to exploit an OGNL injection flaw. This results in the execution of arbitrary code, posing a serious security risk. The affected versions include those prior to 6.13.23 and specific ranges within versions 6.14.0 to 7.4.11, 7.5.0 to 7.11.6, and 7.12.0 to 7.12.5. Organizations using these versions are advised to monitor for signs of exploitation and apply the necessary security updates.",Atlassian,"Confluence Server,Confluence Data Center",9.8,CRITICAL,0.9697399735450745,true,2021-11-03T00:00:00.000Z,false,true,true,2021-11-03T00:00:00.000Z,true,false,false,,2021-08-30T07:15:00.000Z,0 CVE-2021-26085,https://securityvulnerability.io/vulnerability/CVE-2021-26085,Pre-Authorization Arbitrary File Read Vulnerability in Atlassian Confluence Server,A vulnerability exists in Atlassian Confluence Server that allows remote attackers to access restricted files via the /s/ endpoint. This Pre-Authorization Arbitrary File Read issue affects versions prior to 7.4.10 as well as versions from 7.5.0 up to (but not including) 7.12.3. Attackers exploiting this vulnerability can potentially expose sensitive information that should remain protected.,Atlassian,"Confluence Server,Confluence Data Center",5.3,MEDIUM,0.9521399736404419,true,2022-03-28T00:00:00.000Z,false,true,true,2021-10-05T08:20:25.000Z,true,false,false,,2021-08-03T00:15:00.000Z,0 CVE-2021-26072,https://securityvulnerability.io/vulnerability/CVE-2021-26072,Server-Side Request Forgery Vulnerability in Confluence by Atlassian,"The WidgetConnector plugin in Confluence Server and Confluence Data Center versions before 5.8.6 is vulnerable to a blind Server-Side Request Forgery (SSRF). This vulnerability enables remote attackers to exploit the system by manipulating internal network resource requests, potentially leading to unauthorized access and data exposure.",Atlassian,"Confluence Server,Confluence Data Center",4.3,MEDIUM,0.0008200000156648457,false,,false,false,false,,,false,false,,2021-04-01T00:00:00.000Z,0 CVE-2020-29448,https://securityvulnerability.io/vulnerability/CVE-2020-29448,Path Traversal Vulnerability in Confluence Server and Data Center by Atlassian,"The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Data Center versions prior to 6.13.18 and specific versions from 6.14.0 to 7.8.3 contains a vulnerability that enables remote attackers to read sensitive files within the WEB-INF and META-INF directories. This issue arises from an inadequate path access check, allowing unauthorized access to crucial application resources.",Atlassian,"Confluence Server,Confluence Data Center",5.3,MEDIUM,0.0018899999558925629,false,,false,false,false,,,false,false,,2021-02-22T21:15:00.000Z,0 CVE-2020-4027,https://securityvulnerability.io/vulnerability/CVE-2020-4027,Atlassian Confluence Server Vulnerability for Remote Attackers,This vulnerability allowed remote attackers with system admin privileges to bypass velocity template injection mitigations through an injection flaw in custom user macros within Atlassian Confluence Server and Data Center. Affected versions include those prior to 7.4.5 and versions ranging from 7.5.0 to just under 7.5.1. Exploiting this vulnerability could lead to unauthorized actions that could compromise server integrity.,Atlassian,"Confluence Server,Confluence Data Center",4.7,MEDIUM,0.0009899999713525176,false,,false,false,false,,,false,false,,2020-07-01T02:15:00.000Z,0