Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
jira_data_center Vendor: atlassian

About This Product

jira_data_center is a software product offered by atlassian. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 80 known vulnerabilities affecting atlassian jira_data_center. This includes 3 critical-severity issues and 13 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2025, indicating a sustained research interest and ongoing security attention. 62 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-20239 2019-04-30 2024-11-21 5.4 3.5 Unknown
CVE-2019-15001 2019-09-19 2024-11-21 7.2 9.0 Likely
CVE-2019-20106 2020-02-06 2024-11-21 4.3 4.0 Likely
CVE-2019-20403 2020-02-06 2024-11-21 5.3 5.0 Likely
CVE-2019-20404 2020-02-06 2024-11-21 4.3 4.0 Likely
CVE-2019-20405 2020-02-06 2024-11-21 4.3 4.3 Likely
CVE-2019-20098 2020-02-12 2024-11-21 4.3 4.3 Likely
CVE-2019-20099 2020-02-12 2024-11-21 4.3 4.3 Likely
CVE-2019-20100 2020-02-12 2024-11-21 4.7 4.3 Likely
CVE-2019-20407 2020-03-17 2024-11-21 4.3 4.0 Likely
CVE-2020-4021 2020-06-01 2024-11-21 5.4 3.5 Unknown
CVE-2019-20410 2020-06-29 2024-11-21 6.5 4.0 Likely
CVE-2019-20411 2020-06-29 2024-11-21 4.3 4.3 Likely
CVE-2019-20412 2020-06-29 2024-11-21 5.3 5.0 Likely
CVE-2019-20413 2020-06-29 2024-11-21 7.5 5.0 Likely
CVE-2019-20414 2020-06-29 2024-11-21 5.4 3.5 Unknown
CVE-2019-20415 2020-06-30 2024-11-21 4.3 4.3 Likely
CVE-2020-14167 2020-07-01 2024-11-21 7.5 5.0 Likely
CVE-2020-14168 2020-07-01 2024-11-21 5.9 4.3 Likely
CVE-2020-4022 2020-07-01 2024-11-21 6.1 4.3 Likely
CVE-2020-4024 2020-07-01 2024-11-21 5.4 3.5 Unknown
CVE-2020-4025 2020-07-01 2024-11-21 4.8 3.5 Unknown
CVE-2020-4029 2020-07-01 2024-11-21 4.3 4.0 Likely
CVE-2019-20419 2020-07-03 2024-11-21 7.8 4.4 Unknown
CVE-2020-14173 2020-07-03 2024-11-21 5.4 3.5 Unknown
CVE-2019-20897 2020-07-13 2024-11-21 6.5 4.0 Likely
CVE-2019-20899 2020-07-13 2024-11-21 5.3 5.0 Likely
CVE-2019-20900 2020-07-13 2024-11-21 4.8 3.5 Unknown
CVE-2020-14174 2020-07-13 2024-11-21 4.3 4.0 Likely
CVE-2020-14178 2020-09-01 2024-11-21 7.5 5.0 Likely
CVE-2020-14179 2020-09-21 2024-11-21 5.3 5.0 Likely
CVE-2020-36231 2021-02-02 2024-11-21 4.3 4.0 Likely
CVE-2020-36234 2021-02-15 2024-11-21 4.8 3.5 Unknown
CVE-2020-36236 2021-02-15 2024-11-21 6.1 4.3 Likely
CVE-2020-29453 2021-02-22 2024-11-21 5.3 5.0 Likely
CVE-2020-36232 2021-02-22 2024-11-21 5.0 4.0 Likely
CVE-2021-26069 2021-03-22 2024-11-21 5.3 5.0 Likely
CVE-2020-36238 2021-04-01 2024-11-21 5.3 5.0 Likely
CVE-2020-36286 2021-04-01 2024-11-21 5.3 5.0 Likely
CVE-2021-26071 2021-04-01 2024-11-21 3.5 3.5 Unknown
CVE-2020-36287 2021-04-09 2024-11-21 5.3 5.0 Likely
CVE-2020-36288 2021-04-15 2024-11-21 6.1 4.3 Likely
CVE-2021-26075 2021-04-15 2024-11-21 4.3 4.0 Likely
CVE-2021-26076 2021-04-15 2024-11-21 3.7 4.3 Likely
CVE-2020-36289 2021-05-12 2024-11-21 5.3 5.0 Likely
CVE-2021-26079 2021-06-07 2024-11-21 6.1 4.3 Likely
CVE-2021-26080 2021-06-07 2024-11-21 6.1 4.3 Likely
CVE-2021-26081 2021-07-20 2024-11-21 5.3 5.0 Likely
CVE-2021-26082 2021-07-20 2024-11-21 5.4 3.5 Unknown
CVE-2021-26083 2021-07-20 2024-11-21 5.4 3.5 Unknown
CVE-2020-36239 2021-07-29 2024-11-21 9.8 7.5 Likely
CVE-2021-26086 2021-08-16 2025-10-24 5.3 5.0 Likely
CVE-2021-39112 2021-08-25 2024-11-21 4.8 4.9 Unknown
CVE-2021-39111 2021-08-30 2024-11-21 6.1 4.3 Likely
CVE-2021-39113 2021-08-30 2024-11-21 7.5 5.0 Likely
CVE-2021-39116 2021-09-08 2024-11-21 5.5 4.3 Likely
CVE-2021-39121 2021-09-08 2024-11-21 4.3 4.0 Likely
CVE-2021-39122 2021-09-08 2024-11-21 5.3 5.0 Likely
CVE-2021-39128 2021-09-16 2024-11-21 7.2 6.5 Likely
CVE-2021-39126 2021-10-21 2024-11-21 6.5 4.3 Likely
CVE-2021-39127 2021-10-21 2024-11-21 5.3 5.0 Likely
CVE-2021-41304 2021-10-26 2024-11-21 6.1 4.3 Likely
CVE-2021-41308 2021-10-26 2024-11-21 6.5 4.0 Likely
CVE-2021-41313 2021-11-01 2024-11-21 4.3 4.0 Likely
CVE-2021-43946 2022-01-05 2024-11-21 6.5 4.0 Likely
CVE-2021-43947 2022-01-06 2024-11-21 7.2 9.0 Likely
CVE-2021-43952 2022-02-15 2024-11-21 4.3 4.3 Likely
CVE-2021-43941 2022-02-15 2024-11-21 6.5 4.3 Likely
CVE-2021-43944 2022-03-08 2024-11-21 7.2 6.5 Likely
CVE-2022-0540 2022-04-20 2024-11-21 9.8 6.8 Likely
CVE-2022-26135 2022-06-30 2024-11-21 6.5 4.0 Likely
CVE-2022-26136 2022-07-20 2024-11-21 9.8 - -
CVE-2022-26137 2022-07-20 2024-11-21 8.8 - -
CVE-2022-36799 2022-08-01 2024-11-21 7.2 - -
CVE-2022-36801 2022-08-10 2024-11-21 6.1 - -
CVE-2024-21683 2024-05-21 2025-05-12 8.8 - -
CVE-2024-21685 2024-06-18 2025-03-17 6.5 - -
CVE-2019-15002 2025-02-11 2025-07-30 4.3 - -
CVE-2025-22157 2025-05-20 2025-06-12 8.8 - -
CVE-2025-22167 2025-10-22 2025-12-05 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for atlassian jira_data_center by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.