A vulnerability was found in Atlassian JIRA Server up to 8.5.12/8.13.4/8.15.0 and classified as problematic. This issue affects some unknown processing of the file /rest/api/2/search of the component Search Endpoint. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2021-39122. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Atlassian JIRA Server and Data Center up to 8.18.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/api/1.0/render of the component Endpoint. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2021-39118. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Atlassian JIRA Server and Data Center up to 8.15.x. This issue affects some unknown processing of the file /rest/gadget/1.0/createdVsResolved/generate of the component Endpoint. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2021-39123. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apereo Foundation CAS up to 7.0.0-RC7 and classified as critical. This vulnerability affects unknown code of the component Multi-Factor Authentication. The manipulation leads to improper authentication.
This vulnerability was named CVE-2023-4612. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in CoolKit Technology eWeLink Smart Home up to 5.1.x on Android/iOS. This affects an unknown part. The manipulation leads to improper privilege management.
This vulnerability is uniquely identified as CVE-2023-6998. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in class.upload.php. This issue affects some unknown processing. The manipulation leads to unrestricted upload.
The identification of this vulnerability is CVE-2023-6551. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Hongdian H8951-4G-ESP and classified as critical. Affected by this issue is some unknown functionality of the component Configuration Backup Handler. The manipulation leads to hard-coded credentials.
This vulnerability is handled as CVE-2023-49256. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Artificial intelligence (AI) is reshaping the modern business landscape, much like steam and steel shaped the industrial revolutions. Instead of revolutionizing manufacturing processes, AI is transforming IT operations thanks to automation and streamlined processes. Artificial intelligence for IT operations (AIOps)...
When employees and leaders engage with CISOs early in innovation projects, security concerns are addressed proactively, building trust and ensuring innovation and security coexist.