Show filters
501 Total Results
Displaying 311-320 of 501
Sort by:
Attacker Value
Unknown

CVE-2019-3400

Disclosure Date: May 03, 2019 (last updated November 27, 2024)
The labels gadget in Jira before version 7.13.2, and from version 8.0.0 before version 8.0.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the jql parameter.
Attacker Value
Unknown

CVE-2018-20824

Disclosure Date: May 03, 2019 (last updated November 27, 2024)
The WallboardServlet resource in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the cyclePeriod parameter.
0
Attacker Value
Unknown

CVE-2018-20239

Disclosure Date: April 30, 2019 (last updated November 27, 2024)
Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.
Attacker Value
Unknown

CVE-2019-3399

Disclosure Date: April 30, 2019 (last updated November 27, 2024)
The BrowseProjects.jspa resource in Jira before version 7.13.2, and from version 8.0.0 before version 8.0.2 allows remote attackers to see information for archived projects through a missing authorisation check.
Attacker Value
Unknown

CVE-2017-18108

Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The administration SMTP configuration resource in Atlassian Crowd before version 2.10.2 allows remote attackers with administration rights to execute arbitrary code via a JNDI injection.
0
Attacker Value
Unknown

CVE-2017-18105

Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.
0
Attacker Value
Unknown

CVE-2017-18110

Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability.
0
Attacker Value
Unknown

CVE-2017-18111

Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The OAuthHelper in Atlassian Application Links before version 5.0.10, from version 5.1.0 before version 5.1.3, and from version 5.2.0 before version 5.2.6 used an XML document builder that was vulnerable to XXE when consuming a client OAuth request. This allowed malicious oauth application linked applications to probe internal network resources by requesting internal locations, read the contents of files and also cause an out of memory exception affecting availability via an XML External Entity vulnerability.
0
Attacker Value
Unknown

CVE-2017-18109

Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.
0
Attacker Value
Unknown

CVE-2017-18106

Disclosure Date: March 29, 2019 (last updated November 27, 2024)
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.
0