Количество 305
Количество 305
GHSA-xm63-47g5-8r8h
The searchrequest-xml resource in Atlassian Jira before version 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through various fields.
GHSA-wwhc-hp78-qq9x
Cross-site scripting (XSS) vulnerability in 500page.jsp in JIRA Enterprise Edition before 3.12.1 allows remote attackers to inject arbitrary web script or HTML, which is not properly handled when generating error messages, as demonstrated by input originally sent in the URI to secure/CreateIssue. NOTE: some of these details are obtained from third party information.
GHSA-wh7h-qh97-7vjv
The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by "Epic Name".
GHSA-w89h-rg2q-xpj2
The agile wallboard gadget in Atlassian Jira before version 7.8.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of quick filters.
GHSA-w84x-75fx-fxm2
The PieChart gadget in Atlassian Jira before version 7.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the name of a project or filter.
GHSA-w4pp-24v3-vhg4
The issue search resource in Atlassian Jira before version 7.4.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the orderby parameter.
GHSA-v734-hjcr-pm54
The IncomingMailServers resource in Atlassian Jira before version 7.6.2 allows remote attackers to modify the "incoming mail" whitelist setting via a Cross-site request forgery (CSRF) vulnerability.
GHSA-v45j-7q58-p636
Atlassian JIRA Server before 7.1.9 has XSS in project/ViewDefaultProjectRoleActors.jspa via a role name.
GHSA-rr9q-89cr-8fcp
The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object.
GHSA-r798-mxm8-76rv
Atlassian JIRA Server before 7.1.9 has CSRF in auditing/settings.
GHSA-qmhq-876f-cr65
Jenkins Jira Plugin vulnerable to exposure of system-scoped credentials
GHSA-qc68-5gff-qw5c
The Setup Wizard in Atlassian JIRA Enterprise Edition before 3.12.1 does not properly restrict setup attempts after setup is complete, which allows remote attackers to change the default language.
GHSA-m3p3-2gp6-ghq8
Stored Cross-site Scripting vulnerability in Jenkins Jira Plugin
GHSA-j5pf-67fx-vj74
The Jira-importers-plugin in Atlassian Jira before version 7.6.1 allows remote attackers to create new projects and abort an executing external system import via various Cross-site request forgery (CSRF) vulnerabilities.
GHSA-hq38-r2rw-x533
Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010.
GHSA-gh3c-5h89-f225
The IncomingMailServers resource in Atlassian Jira from version 6.2.1 before version 7.4.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the messagesThreshold parameter.
GHSA-g9hc-46cq-rx26
Atlassian JIRA 3.12 through 4.1 allows remote authenticated administrators to execute arbitrary code by modifying the (1) attachment (aka attachments), (2) index (aka indexing), or (3) backup path and then uploading a file, as exploited in the wild in April 2010.
GHSA-fpg6-xqj4-j7wf
Jenkins Jira Plugin Incorrect Authorization vulnerability
GHSA-cp57-2f38-rjxg
The inline-create rest resource in Jira before version 7.12.3 allows authenticated remote attackers to set the reporter in issues via a missing authorisation check.
GHSA-ccfj-r436-q2hv
The activity stream gadget in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the country parameter.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-xm63-47g5-8r8h The searchrequest-xml resource in Atlassian Jira before version 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through various fields. | CVSS3: 6.1 | 0% Низкий | около 3 лет назад | |
GHSA-wwhc-hp78-qq9x Cross-site scripting (XSS) vulnerability in 500page.jsp in JIRA Enterprise Edition before 3.12.1 allows remote attackers to inject arbitrary web script or HTML, which is not properly handled when generating error messages, as demonstrated by input originally sent in the URI to secure/CreateIssue. NOTE: some of these details are obtained from third party information. | 0% Низкий | около 3 лет назад | ||
GHSA-wh7h-qh97-7vjv The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by "Epic Name". | CVSS3: 6.5 | 1% Низкий | около 3 лет назад | |
GHSA-w89h-rg2q-xpj2 The agile wallboard gadget in Atlassian Jira before version 7.8.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of quick filters. | CVSS3: 6.1 | 0% Низкий | около 3 лет назад | |
GHSA-w84x-75fx-fxm2 The PieChart gadget in Atlassian Jira before version 7.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the name of a project or filter. | CVSS3: 6.1 | 0% Низкий | около 3 лет назад | |
GHSA-w4pp-24v3-vhg4 The issue search resource in Atlassian Jira before version 7.4.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the orderby parameter. | CVSS3: 6.1 | 0% Низкий | около 3 лет назад | |
GHSA-v734-hjcr-pm54 The IncomingMailServers resource in Atlassian Jira before version 7.6.2 allows remote attackers to modify the "incoming mail" whitelist setting via a Cross-site request forgery (CSRF) vulnerability. | CVSS3: 4.3 | 0% Низкий | около 3 лет назад | |
GHSA-v45j-7q58-p636 Atlassian JIRA Server before 7.1.9 has XSS in project/ViewDefaultProjectRoleActors.jspa via a role name. | CVSS3: 4.8 | 0% Низкий | около 3 лет назад | |
GHSA-rr9q-89cr-8fcp The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object. | CVSS3: 9.8 | 5% Низкий | около 3 лет назад | |
GHSA-r798-mxm8-76rv Atlassian JIRA Server before 7.1.9 has CSRF in auditing/settings. | CVSS3: 8.8 | 0% Низкий | около 3 лет назад | |
GHSA-qmhq-876f-cr65 Jenkins Jira Plugin vulnerable to exposure of system-scoped credentials | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
GHSA-qc68-5gff-qw5c The Setup Wizard in Atlassian JIRA Enterprise Edition before 3.12.1 does not properly restrict setup attempts after setup is complete, which allows remote attackers to change the default language. | 1% Низкий | около 3 лет назад | ||
GHSA-m3p3-2gp6-ghq8 Stored Cross-site Scripting vulnerability in Jenkins Jira Plugin | CVSS3: 5.4 | 18% Средний | около 3 лет назад | |
GHSA-j5pf-67fx-vj74 The Jira-importers-plugin in Atlassian Jira before version 7.6.1 allows remote attackers to create new projects and abort an executing external system import via various Cross-site request forgery (CSRF) vulnerabilities. | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
GHSA-hq38-r2rw-x533 Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010. | 1% Низкий | около 3 лет назад | ||
GHSA-gh3c-5h89-f225 The IncomingMailServers resource in Atlassian Jira from version 6.2.1 before version 7.4.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the messagesThreshold parameter. | CVSS3: 6.1 | 0% Низкий | около 3 лет назад | |
GHSA-g9hc-46cq-rx26 Atlassian JIRA 3.12 through 4.1 allows remote authenticated administrators to execute arbitrary code by modifying the (1) attachment (aka attachments), (2) index (aka indexing), or (3) backup path and then uploading a file, as exploited in the wild in April 2010. | 5% Низкий | около 3 лет назад | ||
GHSA-fpg6-xqj4-j7wf Jenkins Jira Plugin Incorrect Authorization vulnerability | CVSS3: 4.2 | 0% Низкий | около 3 лет назад | |
GHSA-cp57-2f38-rjxg The inline-create rest resource in Jira before version 7.12.3 allows authenticated remote attackers to set the reporter in issues via a missing authorisation check. | CVSS3: 4.3 | 0% Низкий | около 3 лет назад | |
GHSA-ccfj-r436-q2hv The activity stream gadget in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the country parameter. | CVSS3: 5.4 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу