cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-39115,https://securityvulnerability.io/vulnerability/CVE-2021-39115,,"Affected versions of Atlassian Jira Service Management Server and Data Center allow remote attackers with ""Jira Administrators"" access to execute arbitrary Java code or run arbitrary system commands via a Server_Side Template Injection vulnerability in the Email Template feature. The affected versions are before version 4.13.9, and from version 4.14.0 before 4.18.0.",Atlassian,"Jira Service Desk Server,Jira Service Desk Data Center",7.2,HIGH,0.0024800000246614218,false,false,false,true,true,false,false,2021-09-01T23:15:00.000Z,0 CVE-2020-14166,https://securityvulnerability.io/vulnerability/CVE-2020-14166,,The /servicedesk/customer/portals resource in Jira Service Desk Server and Data Center before version 4.10.0 allows remote attackers with project administrator privileges to inject arbitrary HTML or JavaScript names via an Cross Site Scripting (XSS) vulnerability by uploading a html file.,Atlassian,Jira Service Desk Server And Data Center,4.8,MEDIUM,0.0028299998957663774,false,false,false,false,,false,false,2020-07-01T00:00:00.000Z,0 CVE-2019-15003,https://securityvulnerability.io/vulnerability/CVE-2019-15003,,"The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before 3.9.17, from 3.10.0 before 3.16.10, from 4.0.0 before 4.2.6, from 4.3.0 before 4.3.5, from 4.4.0 before 4.4.3, and from 4.5.0 before 4.5.1 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via authorization bypass. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.",Atlassian,"Jira Service Desk Server,Jira Service Desk Data Center",5.3,MEDIUM,0.002950000111013651,false,false,false,false,,false,false,2019-11-07T00:00:00.000Z,0 CVE-2019-15004,https://securityvulnerability.io/vulnerability/CVE-2019-15004,,"The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before 3.9.17, from 3.10.0 before 3.16.10, from 4.0.0 before 4.2.6, from 4.3.0 before 4.3.5, from 4.4.0 before 4.4.3, and from 4.5.0 before 4.5.1 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.",Atlassian,"Jira Service Desk Server,Jira Service Desk Data Center",7.5,HIGH,0.0036800000816583633,false,false,false,false,,false,false,2019-11-07T00:00:00.000Z,0 CVE-2019-14994,https://securityvulnerability.io/vulnerability/CVE-2019-14994,,"The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version 4.4.0 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability.",Atlassian,"Jira Service Desk Server,Jira Service Desk Data Center",7.5,HIGH,0.0028899998869746923,false,false,false,false,,false,false,2019-09-19T15:15:00.000Z,0