
CVE-2008-6832
https://notcve.org/view.php?id=CVE-2008-6832
08 Jun 2009 — Cross-site request forgery (CSRF) vulnerability in Atlassian JIRA Enterprise Edition 3.13 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de falsificación de petición en sitios cruzados(CSRF) en JIRA Enterprise Edition v3.13 de Atlassian permite a usuarios remotos secuestrar la autenticación de usuarios sin especificar a través de ... • http://osvdb.org/49417 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2008-6831
https://notcve.org/view.php?id=CVE-2008-6831
08 Jun 2009 — Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA Enterprise Edition 3.13 allow remote attackers to inject arbitrary web script or HTML via the (1) fullname (Full Name) parameter in the ViewProfile page or (2) returnUrl parameter in a form, as demonstrated using secure/AddComment!default.jspa (aka "Add Comment"). Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en JIRA Enterprise Edition v3.13 de Atlassian permiten a usuarios remotos inyectar codigo web scrip... • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2008-10-29 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2008-6531
https://notcve.org/view.php?id=CVE-2008-6531
26 Mar 2009 — The WebWork 1 web application framework in Atlassian JIRA before 3.13.2 allows remote attackers to invoke exposed public JIRA methods via a crafted URL that is dynamically transformed into method calls, aka "WebWork 1 Parameter Injection Hole." La la aplicación ebWork 1 web framework en Atlassian JIRA v3.13.2, permite a atacantes remotos invocar los métodos públicos de JIRA a través de una URL manipulada en la llamada al método. También conocido como "WebWork 1 Parameter Injection Hole." • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2008-12-09 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2007-6619
https://notcve.org/view.php?id=CVE-2007-6619
03 Jan 2008 — The Setup Wizard in Atlassian JIRA Enterprise Edition before 3.12.1 does not properly restrict setup attempts after setup is complete, which allows remote attackers to change the default language. El Asistente de Instalación de Atlassian JIRAEnterprise Edition anterior a 3.12.1 no restringe adecuadamente los intentos de instalación una vez que la instalación se ha completado, lo cual permite a atacantes remotos cambiar el lenguaje por defecto. • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2007-6618
https://notcve.org/view.php?id=CVE-2007-6618
03 Jan 2008 — JIRA Enterprise Edition before 3.12.1 allows remote attackers to delete another user's shared filter via a modified filter ID. JIRA Enterprise Edition anterior a 3.12.1 permite a atacantes remotos borrar filtros compartidos de otros usuarios mediante un identificador de filtro modificado. • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24 •

CVE-2007-6617
https://notcve.org/view.php?id=CVE-2007-6617
03 Jan 2008 — Cross-site scripting (XSS) vulnerability in 500page.jsp in JIRA Enterprise Edition before 3.12.1 allows remote attackers to inject arbitrary web script or HTML, which is not properly handled when generating error messages, as demonstrated by input originally sent in the URI to secure/CreateIssue. NOTE: some of these details are obtained from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en 500page.jsp de JIRA Enterprise Edition versiones anteriores a 3.12.1 permi... • http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2007-12-24 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2006-3338
https://notcve.org/view.php?id=CVE-2006-3338
03 Jul 2006 — Cross-site scripting (XSS) vulnerability in Atlassian JIRA 3.6.2-#156 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in a direct request to secure/ConfigureReleaseNote.jspa, which are not sanitized before being returned in an error page. Una vulnerabilidad de Ejecución de comandos en sitios cruzados (XSS) en Atlassian JIRA 3.6.2-#156 permite a atacantes remotos inyectar HTML o scripts web arbitrarios a través de vectores sin especificar en una solicitud directa a secu... • http://pridels0.blogspot.com/2006/06/atlassian-jira-information-disclosure.html •

CVE-2006-3339
https://notcve.org/view.php?id=CVE-2006-3339
03 Jul 2006 — secure/ConfigureReleaseNote.jspa in Atlassian JIRA 3.6.2-#156 allows remote attackers to obtain sensitive information via unspecified manipulations of the projectId parameter, which displays the installation path and other system information in an error message. secure/ConfigureReleaseNote.jspa en Atlassian JIRA v3.6.2-#156 permite a atacantes remotos obtener información sensible a través de manipulaciones sin especificar del parámetro "projectId", que muestra la ruta de instalación y otra información del s... • http://jira.atlassian.com/browse/JRA-10542 •