Show filters
136 Total Results
Displaying 81-90 of 136
Sort by:
Attacker Value
Unknown

CVE-2019-20404

Disclosure Date: February 04, 2020 (last updated November 27, 2024)
The API in Atlassian Jira Server and Data Center before version 8.6.0 allows authenticated remote attackers to determine project titles they do not have access to via an improper authorization vulnerability.
Attacker Value
Unknown

CVE-2019-20403

Disclosure Date: February 04, 2020 (last updated November 27, 2024)
The API in Atlassian Jira Server and Data Center before version 8.6.0 allows remote attackers to determine if a Jira project key exists or not via an information disclosure vulnerability.
Attacker Value
Unknown

CVE-2020-36234

Disclosure Date: February 04, 2020 (last updated February 22, 2025)
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Screens Modal view. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.
Attacker Value
Unknown

CVE-2019-20400

Disclosure Date: February 04, 2020 (last updated February 21, 2025)
The usage of Tomcat in Jira before version 8.5.2 allows local attackers with permission to write a dll file to a directory in the global path environmental variable can inject code into via a DLL hijacking vulnerability.
Attacker Value
Unknown

CVE-2019-20405

Disclosure Date: February 04, 2020 (last updated February 21, 2025)
The JMX monitoring flag in Atlassian Jira Server and Data Center before version 8.6.0 allows remote attackers to turn the JMX monitoring flag off or on via a Cross-site request forgery (CSRF) vulnerability.
Attacker Value
Unknown

CVE-2019-20099

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The VerifyPopServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
Attacker Value
Unknown

CVE-2019-20098

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The VerifySmtpServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
Attacker Value
Unknown

CVE-2019-20100

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
Attacker Value
Unknown

CVE-2019-15013

Disclosure Date: December 18, 2019 (last updated November 27, 2024)
The WorkflowResource class removeStatus method in Jira before version 7.13.12, from version 8.0.0 before version 8.4.3, and from version 8.5.0 before version 8.5.2 allows authenticated remote attackers who do not have project administration access to remove a configured issue status from a project via a missing authorisation check.
Attacker Value
Unknown

CVE-2019-20901

Disclosure Date: December 17, 2019 (last updated February 21, 2025)
The login.jsp resource in Jira before version 8.5.2, and from version 8.6.0 before version 8.6.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect in the os_destination parameter.