cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2018-1000418,https://securityvulnerability.io/vulnerability/CVE-2018-1000418,,"An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.",Atlassian,Hipchat,8.8,HIGH,0.0009899999713525176,false,false,false,false,,false,false,2019-01-09T23:00:00.000Z,0 CVE-2018-1000419,https://securityvulnerability.io/vulnerability/CVE-2018-1000419,,An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.,Atlassian,Hipchat,6.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2019-01-09T23:00:00.000Z,0 CVE-2017-14586,https://securityvulnerability.io/vulnerability/CVE-2017-14586,,The Hipchat for Mac desktop client is vulnerable to client-side remote code execution via video call link parsing. Hipchat for Mac desktop clients at or above version 4.0 and before version 4.30 are affected by this vulnerability.,Atlassian,Hipchat For Mac Desktop Client,9.8,CRITICAL,0.021150000393390656,false,false,false,false,,false,false,2017-11-27T16:29:00.000Z,0 CVE-2017-14585,https://securityvulnerability.io/vulnerability/CVE-2017-14585,,A Server Side Request Forgery (SSRF) vulnerability could lead to remote code execution for authenticated administrators. This issue was introduced in version 2.2.0 of Hipchat Server and version 3.0.0 of Hipchat Data Center. Versions of Hipchat Server starting with 2.2.0 and before 2.2.6 are affected by this vulnerability. Versions of Hipchat Data Center starting with 3.0.0 and before 3.1.0 are affected.,Atlassian,"Hipchat Server,Hipchat Data Center",7.2,HIGH,0.00925000011920929,false,false,false,false,,false,false,2017-11-27T16:29:00.000Z,0 CVE-2017-8080,https://securityvulnerability.io/vulnerability/CVE-2017-8080,,Atlassian Hipchat Server before 2.2.4 allows remote authenticated users with user level privileges to execute arbitrary code via vectors involving image uploads.,Atlassian,Hipchat Server,8.8,HIGH,0.007410000078380108,false,false,false,false,,false,false,2017-05-05T14:00:00.000Z,0 CVE-2017-8058,https://securityvulnerability.io/vulnerability/CVE-2017-8058,,Acceptance of invalid/self-signed TLS certificates in Atlassian HipChat before 3.16.2 for iOS allows a man-in-the-middle and/or physically proximate attacker to silently intercept information sent during the login API call.,Atlassian,Hipchat,5.9,MEDIUM,0.0007300000288523734,false,false,false,false,,false,false,2017-05-05T07:04:00.000Z,0 CVE-2017-7357,https://securityvulnerability.io/vulnerability/CVE-2017-7357,,Hipchat Server before 2.2.3 allows remote authenticated users with Server Administrator level privileges to execute arbitrary code by importing a file.,Atlassian,Hipchat Server,9.1,CRITICAL,0.005229999776929617,false,false,false,false,,false,false,2017-04-14T18:00:00.000Z,0 CVE-2015-5603,https://securityvulnerability.io/vulnerability/CVE-2015-5603,,"The HipChat for JIRA plugin before 6.30.0 for Atlassian JIRA allows remote authenticated users to execute arbitrary Java code via unspecified vectors, related to ""Velocity Template Injection Vulnerability.""",Atlassian,Hipchat,,,0.5271999835968018,false,false,false,false,,false,false,2015-09-21T19:00:00.000Z,0