Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Atlassian | Jira Server | unspecified ~ 8.5.8 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2020-14179 Scanner | https://github.com/c0brabaghdad1/CVE-2020-14179 | POC Details |
| 2 | Sensitive data exposure via /secure/QueryComponent!Default.jspa endpoint - CVE-2020-14179 | https://github.com/mrnazu/CVE-2020-14179 | POC Details |
| 3 | 𓃌 - Atlassian Jira Information Disclosure SLA & Field names | https://github.com/0romos/CVE-2020-14179 | POC Details |
| 4 | Jira 8.5.8 & 8.6.0 - 8.11.1 unauthorized view of SLA fields. | https://github.com/0x0060/CVE-2020-14179 | POC Details |
| 5 | Atlassian Jira Server and Data Center before 8.5.8 and 8.6.0 through 8.11.1 are susceptible to information disclosure via the /secure/QueryComponent!Default.jspa endpoint. An attacker can view custom field names and custom SLA names. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-14179.yaml | POC Details |
| 6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Jira%20Server%20%E5%8F%8A%20Data%20Center%20%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E%20CVE-2020-14179.md | POC Details |
| 7 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/jira-cve-2020-14179.yml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet