From b19bcfacf8cf3a0a8cd36e4d625ae214cb1eb491 Mon Sep 17 00:00:00 2001 From: ree4pwn <56899471+ree4pwn@users.noreply.github.com> Date: Sat, 5 Dec 2020 17:00:05 +0800 Subject: [PATCH] Update CVE-2019-11581.yaml Fix syntax error --- cves/CVE-2019-11581.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/CVE-2019-11581.yaml b/cves/CVE-2019-11581.yaml index b19886d38b..ab3adcdae3 100644 --- a/cves/CVE-2019-11581.yaml +++ b/cves/CVE-2019-11581.yaml @@ -4,7 +4,7 @@ info: name: Atlassian Jira template injection description: There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability. author: ree4pwn - severity:` critical + severity: critical requests: - method: GET