Page 7 of 48 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter. El recurso review attachment en Atlassian Fisheye y Crucible en versiones anteriores a la 4.3.2, desde la 4.4.0 hasta la 4.4.3 y en versiones anteriores a la 4.5.0 permite que los atacantes remotos lean archivos contenidos en la ruta context de la aplicación en ejecución mediante una vulnerabilidad de salto de directorio en el parámetro command. • http://www.securityfocus.com/bid/104578 https://jira.atlassian.com/browse/CRUC-8212 https://jira.atlassian.com/browse/FE-7061 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers. El recurso /browse/~raw en Atlassian FishEye y Crucible, en versiones anteriores a la 4.5.3, permite que atacantes remotos inyecten HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) en la gestión de cabeceras de respuesta. • http://www.securityfocus.com/bid/104006 https://jira.atlassian.com/browse/CRUC-8201 https://jira.atlassian.com/browse/FE-7035 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability. Fisheye y Crucible no comprobaban correctamente si un URI de repositorio Mercurial configurado contenía valores que el sistema operativo de Windows podría considerar como parámetros de argumento. Un atacante que tenga permiso para añadir un repositorio en Fisheye o Crucible puede ejecutar código de su elección en sistemas que ejecutan una versión vulnerable de Fisheye y Crucible en el sistema operativo Windows. • http://www.securityfocus.com/bid/103665 https://confluence.atlassian.com/x/Zi5sO https://confluence.atlassian.com/x/aS5sO https://jira.atlassian.com/browse/CRUC-8181 https://jira.atlassian.com/browse/FE-7014 • CWE-20: Improper Input Validation •

CVSS: 4.8EPSS: 0%CPEs: 4EXPL: 0

Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allow remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the base path setting of a configured file system repository. Varios recursos en Atlassian Fisheye y Crucible en versiones anteriores a la 4.4.3 (la versión parcheada para 4.4.x) y 4.5.0 permiten que atacantes remotos con privilegios administrativos inyecten código HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) a través de la configuración de ruta base de un repositorio de sistema de archivos configurado. • https://jira.atlassian.com/browse/CRUC-8177 https://jira.atlassian.com/browse/FE-7010 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 0

Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allow remote attackers who have permission to add or modify a repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the location setting of a configured repository. Varios recursos en Atlassian Fisheye y Crucible en versiones anteriores a la 4.4.3 (la versión parcheada para 4.4.x) y anteriores a la 4.5.0 permite que atacantes remotos que tengan permiso para añadir o modificar un repositorio inyecten código HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) a través de la configuración de localización de un repositorio configurado. • http://www.securityfocus.com/bid/103095 https://jira.atlassian.com/browse/CRUC-8175 https://jira.atlassian.com/browse/FE-7008 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •