Known Vulnerabilities for Hipchat Server by Atlassian

Listed below are 3 of the newest known vulnerabilities associated with the software "Hipchat Server" by "Atlassian".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2017-14585 A Server Side Request Forgery (SSRF) vulnerability could lead to remote code execution for authenticated administrators. This... 7.2 - HIGH 2017-11-27 2017-12-20
CVE-2017-8080 Atlassian Hipchat Server before 2.2.4 allows remote authenticated users with user level privileges to execute arbitrary code ... 8.8 - HIGH 2017-05-05 2019-10-03
CVE-2017-7357 Hipchat Server before 2.2.3 allows remote authenticated users with Server Administrator level privileges to execute arbitrary... 9.1 - CRITICAL 2017-04-14 2018-10-09

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAtlassianHipchat Server2.4.3AllAllAll
ApplicationAtlassianHipchat Server2.4.2AllAllAll
ApplicationAtlassianHipchat Server2.4.1AllAllAll
ApplicationAtlassianHipchat Server2.4.0AllAllAll
ApplicationAtlassianHipchat Server2.2.9AllAllAll
ApplicationAtlassianHipchat Server2.2.7AllAllAll
ApplicationAtlassianHipchat Server2.2.5AllAllAll
ApplicationAtlassianHipchat Server2.2.4AllAllAll
ApplicationAtlassianHipchat Server2.2.3AllAllAll
ApplicationAtlassianHipchat Server2.2.2AllAllAll
ApplicationAtlassianHipchat Server2.2.1AllAllAll
ApplicationAtlassianHipchat Server2.2.0AllAllAll

Popular searches for Hipchat Server

Atlassian + Slack | Atlassian

www.atlassian.com/partnerships/slack

Atlassian Slack | Atlassian Atlassian 7 5 3 and Slack have forged a new strategic partnership.

www.atlassian.com/licensing/hipchat www.atlassian.com/software/hipchat atlassian.com/software/hipchat hipchat.com synd.co/1yMtcbq www.hipchat.com/gtjX3uPYE www.hipchat.com/docs/apiv2 l.androidpt.com/chat www.atlassian.com/partnerships/slack/migration Slack (software) Atlassian Blog Jira (software) Cloud computing Programmer Trello Strategic partnership Confluence (software) Computer security Email Technology roadmap Application software Marketing Patch (computing) Bamboo (software) Distributed version control Small business Finance Mobile app

Hipchat Server Security Advisory 2017-11-22 | Hipchat Data Center and Server Server | Atlassian Documentation

confluence.atlassian.com/hc/hipchat-server-security-advisory-2017-11-22-939946293.html

Hipchat Server Security Advisory 2017-11-22 | Hipchat Data Center and Server Server | Atlassian Documentation E-2017-14585 - Remote code execution in Hipchat Server and Data Center. 4.0 <= version < 4.30. This advisory discloses critical severity security vulnerabilities affecting the Hipchat for Mac desktop client and Hipchat Server & Data Center products. Hipchat Server Hipchat X V T Data Center - Remote code execution via SSRF in 'admin' interface - CVE-2017-14585.

confluence.atlassian.com/display/HC/HipChat+Server+Security+Advisory+2017-11-22 HipChat Server (computing) Data center Atlassian Arbitrary code execution Vulnerability (computing) Desktop environment Common Vulnerabilities and Exposures MacOS Computer security Documentation Internet Explorer 4 Upgrade Jira (software) Macintosh Patch (computing) Client-side Interface (computing) K Desktop Environment 2 Android Jelly Bean

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report