CVE-2010-1164
Vulnerability from cvelistv5
Published
2010-04-20 15:00
Modified
2024-08-07 01:14
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "jira-element-xss(57827)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57827" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.atlassian.com/browse/JRA-20994" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16" }, { "name": "jira-groupnames-xss(57826)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57826" }, { "name": "[oss-security] 20100416 CVE Request: JIRA Issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/16/3" }, { "name": "[oss-security] 20100416 Re: CVE Request: JIRA Issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/16/4" }, { "name": "39353", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39353" }, { "name": "39485", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39485" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.atlassian.com/browse/JRA-21004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "jira-element-xss(57827)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57827" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.atlassian.com/browse/JRA-20994" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16" }, { "name": "jira-groupnames-xss(57826)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57826" }, { "name": "[oss-security] 20100416 CVE Request: JIRA Issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/16/3" }, { "name": "[oss-security] 20100416 Re: CVE Request: JIRA Issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/16/4" }, { "name": "39353", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39353" }, { "name": "39485", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39485" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.atlassian.com/browse/JRA-21004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-1164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "jira-element-xss(57827)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57827" }, { "name": "http://jira.atlassian.com/browse/JRA-20994", "refsource": "CONFIRM", "url": "http://jira.atlassian.com/browse/JRA-20994" }, { "name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16" }, { "name": "jira-groupnames-xss(57826)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57826" }, { "name": "[oss-security] 20100416 CVE Request: JIRA Issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/04/16/3" }, { "name": "[oss-security] 20100416 Re: CVE Request: JIRA Issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/04/16/4" }, { "name": "39353", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39353" }, { "name": "39485", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39485" }, { "name": "http://jira.atlassian.com/browse/JRA-21004", "refsource": "CONFIRM", "url": "http://jira.atlassian.com/browse/JRA-21004" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1164", "datePublished": "2010-04-20T15:00:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:06.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEA72E9E-ED89-4CD1-AF2F-3C2060E115FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67D2DF18-C072-47EF-9F99-3FBC3BD0B46A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"618C3DD0-2AE2-4188-8BC2-69365594ADA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E76A26-4A32-4D17-AE09-DAA99AAA49D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59835FFB-BB1C-4403-9CEC-DFC31F1A4D10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAD7160D-BB0D-433A-8C7B-83BC311F53A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74F52C0A-6567-4466-A20C-9BC457E56592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"547EF015-960F-43DB-8985-8BE65B14230A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4931F747-FA7D-42BF-B71F-277EE38A29C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:3.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"856597BE-1407-4587-B591-BD8B5B097B8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6039B692-0E90-428E-B953-D1F21AC48575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEED2354-51E8-4BF0-A07E-C70E14A8D79A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E22F6B-1CB8-4BAA-85EE-9B5FC4FD7635\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:jira:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B07F838-5D36-4CEB-9579-3AB8BD67CCB6\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de falsificaci\\u00f3n de petici\\u00f3n en sitios cruzados (CSRF) en Atlassian JIRA v3.12 hasta la v4.1. Permiten a usuarios remotos inyectar codigo de script web o c\\u00f3digo HTML de su elecci\\u00f3n a trav\\u00e9s de el par\\u00e1metro (1) \\\"element\\\" (elemento) o (2) \\\"defaultColor\\\" (color por defecto) a la p\\u00e1gina de \\\"Colour Picker\\\" (selecci\\u00f3n de colores); el (3) par\\u00e1metro \\\"formName\\\", (4) par\\u00e1metro \\\"element\\\", o (5) campo \\\"full name\\\" (nombre completo) a la p\\u00e1gina \\\"User Picker\\\" (selecci\\u00f3n de usuario); el (6) par\\u00e1metro formName, (7) par\\u00e1metro \\\"element\\\", o (8) campo \\\"group name\\\" (nombre de grupo) a la p\\u00e1gina \\\"Group Picker\\\" (selecci\\u00f3n de grupo); el (9) par\\u00e1metro announcement_preview_banner_st de componentes sin especificar, relacionados con la p\\u00e1gina \\\"Announcement Banner Preview\\\" (vista previa de anuncio); vectores sin especificar relacionados con las p\\u00e1ginas (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, o (14) cleancommentspam.jsp; el (15) par\\u00e1metro portletKey de runportleterror.jsp; la (16) URI de issuelinksmall.jsp; el (17) par\\u00e1metro afterURL de screenshot-redirecter.jsp; o la (18) cabecera HTTP Referrer de 500page.jsp, tal como se ha explotado activamente en Abril del 2010.\"}]", "id": "CVE-2010-1164", "lastModified": "2024-11-21T01:13:46.883", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2010-04-20T15:30:00.507", "references": "[{\"url\": \"http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://jira.atlassian.com/browse/JRA-20994\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jira.atlassian.com/browse/JRA-21004\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/39353\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2010/04/16/3\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2010/04/16/4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/39485\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/57826\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/57827\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://jira.atlassian.com/browse/JRA-20994\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://jira.atlassian.com/browse/JRA-21004\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/39353\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2010/04/16/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2010/04/16/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/39485\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/57826\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/57827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2010-1164\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-04-20T15:30:00.507\",\"lastModified\":\"2024-11-21T01:13:46.883\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 through 4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en Atlassian JIRA v3.12 hasta la v4.1. Permiten a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de el par\u00e1metro (1) \\\"element\\\" (elemento) o (2) \\\"defaultColor\\\" (color por defecto) a la p\u00e1gina de \\\"Colour Picker\\\" (selecci\u00f3n de colores); el (3) par\u00e1metro \\\"formName\\\", (4) par\u00e1metro \\\"element\\\", o (5) campo \\\"full name\\\" (nombre completo) a la p\u00e1gina \\\"User Picker\\\" (selecci\u00f3n de usuario); el (6) par\u00e1metro formName, (7) par\u00e1metro \\\"element\\\", o (8) campo \\\"group name\\\" (nombre de grupo) a la p\u00e1gina \\\"Group Picker\\\" (selecci\u00f3n de grupo); el (9) par\u00e1metro announcement_preview_banner_st de componentes sin especificar, relacionados con la p\u00e1gina \\\"Announcement Banner Preview\\\" (vista previa de anuncio); vectores sin especificar relacionados con las p\u00e1ginas (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, o (14) cleancommentspam.jsp; el (15) par\u00e1metro portletKey de runportleterror.jsp; la (16) URI de issuelinksmall.jsp; el (17) par\u00e1metro afterURL de screenshot-redirecter.jsp; o la (18) cabecera HTTP Referrer de 500page.jsp, tal como se ha explotado activamente en Abril del 2010.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA72E9E-ED89-4CD1-AF2F-3C2060E115FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67D2DF18-C072-47EF-9F99-3FBC3BD0B46A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"618C3DD0-2AE2-4188-8BC2-69365594ADA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E76A26-4A32-4D17-AE09-DAA99AAA49D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59835FFB-BB1C-4403-9CEC-DFC31F1A4D10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD7160D-BB0D-433A-8C7B-83BC311F53A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F52C0A-6567-4466-A20C-9BC457E56592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"547EF015-960F-43DB-8985-8BE65B14230A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4931F747-FA7D-42BF-B71F-277EE38A29C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:3.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856597BE-1407-4587-B591-BD8B5B097B8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6039B692-0E90-428E-B953-D1F21AC48575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEED2354-51E8-4BF0-A07E-C70E14A8D79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E22F6B-1CB8-4BAA-85EE-9B5FC4FD7635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:jira:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B07F838-5D36-4CEB-9579-3AB8BD67CCB6\"}]}]}],\"references\":[{\"url\":\"http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jira.atlassian.com/browse/JRA-20994\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jira.atlassian.com/browse/JRA-21004\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/39353\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/04/16/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/04/16/4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/39485\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/57826\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/57827\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2010-04-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jira.atlassian.com/browse/JRA-20994\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jira.atlassian.com/browse/JRA-21004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/39353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/04/16/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/04/16/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/39485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/57826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/57827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.