Vulnerability Name CVE Severity
Jetty Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-26048) CVE-2023-26048
Jetty ConcatServlet Information Disclosure (CVE-2021-28169) CVE-2021-28169
Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656) CVE-2017-7656
Jetty CVE-2018-12536 Vulnerability (CVE-2018-12536) CVE-2018-12536
Jetty CVE-2020-27218 Vulnerability (CVE-2020-27218) CVE-2020-27218
Jetty CVE-2023-26049 Vulnerability (CVE-2023-26049) CVE-2023-26049
Jetty CVE-2023-40167 Vulnerability (CVE-2023-40167) CVE-2023-40167
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045) CVE-2009-5045
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080) CVE-2015-2080
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-28169) CVE-2021-28169
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-34429) CVE-2021-34429
Jetty Improper Access Control Vulnerability (CVE-2016-4800) CVE-2016-4800
Jetty Improper Input Validation Vulnerability (CVE-2022-2047) CVE-2022-2047
Jetty Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-28163) CVE-2021-28163
Jetty Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2009-5046) CVE-2009-5046
Jetty Improper Neutralization of Quoting Syntax Vulnerability (CVE-2023-36479) CVE-2023-36479
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191) CVE-2022-2191
Jetty Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2009-5047) CVE-2009-5047
Jetty Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7658) CVE-2017-7658
Jetty Information Disclosure (CVE-2021-34429) CVE-2021-34429 CVE-2021-28164
Jetty Insufficient Session Expiration Vulnerability (CVE-2021-34428) CVE-2021-34428
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2017-7657) CVE-2017-7657
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478) CVE-2023-36478
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735) CVE-2017-9735
Jetty Other Vulnerability (CVE-2020-27216) CVE-2020-27216
Jetty Session Fixation Vulnerability (CVE-2018-12538) CVE-2018-12538
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223) CVE-2020-27223
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165) CVE-2021-28165
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048) CVE-2022-2048
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487) CVE-2023-44487
Jetty Weak Authentication Vulnerability (CVE-2023-41900) CVE-2023-41900
Jira Projects accessible anonymously
Jira QueryComponent Information Disclosure (CVE-2020-14179) CVE-2020-14179
JIRA Security Advisory 2012-08-28
JIRA Security Advisory 2013-02-21
JIRA Security Advisory 2014-02-26
Jira Seraph Authentication Bypass (CVE-2022-0540) CVE-2022-0540
Jira SSTI CVE-2019-11581 CVE-2019-11581
Jira Unauthorized SSRF via REST API CVE-2019-8451
Jira Unauthorized User Enumeration (CVE-2020-14181) CVE-2020-14181
Jira Unauthorized User Enumeration via UserPickerBrowser
Joe Editor DEADJOE file
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-0168) CVE-2014-0168
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10899) CVE-2018-10899
Jolokia Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2018-1000129) CVE-2018-1000129
Jolokia XML External Entity (XXE) vulnerability
Joomla! 1.6.0 SQL injection vulnerability CVE-2011-1151
Joomla! 1.6/1.7/2.5 privilege escalation vulnerability CVE-2012-1563
Joomla! 1.7/2.5 SQL injection vulnerability CVE-2012-1116
Joomla! 3.2.1 sql injection
Joomla! component Kunena Forum multiple vulnerabilities CVE-2014-9102 CVE-2014-9103
Joomla! Core 1.0 Remote File Inclusion (1.0.0) CVE-2006-2960
Joomla! Core 1.0.5 Security Bypass (1.0.5) CVE-2006-0114
Joomla! Core 1.0.x Cross-Site Scripting (1.0.0 - 1.0.11) CVE-2006-6832
Joomla! Core 1.0.x Cross-Site Scripting (1.0.0 - 1.0.15) CVE-2011-0005
Joomla! Core 1.0.x Multiple Cross-Site Scripting Vulnerabilities (1.0.0 - 1.0.10) CVE-2006-4474
Joomla! Core 1.0.x Multiple Cross-Site Scripting Vulnerabilities (1.0.0 - 1.0.12) CVE-2007-4189 CVE-2007-4190 CVE-2007-5577
Joomla! Core 1.0.x Multiple Unspecified Vulnerabilities (1.0.0 - 1.0.5) CVE-2006-0303
Joomla! Core 1.0.x Multiple Unspecified Vulnerabilities (1.0.0 - 1.0.7) CVE-2006-1030 CVE-2006-1047
Joomla! Core 1.0.x Multiple Unspecified Vulnerabilities (1.0.0 - 1.0.9) CVE-2006-7008 CVE-2006-7009
Joomla! Core 1.0.x Multiple Unspecified Vulnerabilities (1.0.0 - 1.0.10) CVE-2006-4466 CVE-2006-4468 CVE-2006-4469 CVE-2006-4470 CVE-2006-4472 CVE-2006-4473 CVE-2006-4475 CVE-2006-4476
Joomla! Core 1.0.x Multiple Unspecified Vulnerabilities (1.0.0 - 1.0.11) CVE-2006-6833 CVE-2006-6834
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.3) CVE-2005-3771 CVE-2005-3772 CVE-2005-4650
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.7) CVE-2006-1027 CVE-2006-1028 CVE-2006-1029 CVE-2006-1048 CVE-2006-1049
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.9) CVE-2006-3480 CVE-2006-3481 CVE-2006-7010
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.12) CVE-2007-4184 CVE-2007-4185
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.13) CVE-2007-5427
Joomla! Core 1.0.x Remote File Inclusion (1.0.11 - 1.0.14) CVE-2008-5671
Joomla! Core 1.0.x Security Bypass (1.0.0 - 1.0.10) CVE-2006-4471
Joomla! Core 1.0.x Session Fixation (1.0.0 - 1.0.12) CVE-2007-4188
Joomla! Core 1.0.x SQL Injection (1.0.0 - 1.0.11) CVE-2007-0374
Joomla! Core 1.0.x Unspecified Vulnerability (1.0.0 - 1.0.3) CVE-2005-3773
Joomla! Core 1.5.12 Arbitrary File Upload (1.5.12) CVE-2011-4906 CVE-2011-4908
Joomla! Core 1.5.x Arbitrary File Upload (1.5.0 - 1.5.15) CVE-2010-1433
Joomla! Core 1.5.x Cross-Site Scripting (1.5.0 - 1.5.7) CVE-2008-6299