cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-26136,https://securityvulnerability.io/vulnerability/CVE-2022-26136,,"A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",Atlassian,"Bamboo Server,Bamboo Data Center,Bitbucket Server,Bitbucket Data Center,Confluence Server,Confluence Data Center,Crowd Server,Crowd Data Center,Crucible,Fisheye,Jira Core Server,Jira Software Server,Jira Software Data Center,Jira Service Management Server,Jira Service Management Data Center",9.8,CRITICAL,0.007739999797195196,false,false,false,false,,false,false,2022-07-20T00:00:00.000Z,0 CVE-2022-26137,https://securityvulnerability.io/vulnerability/CVE-2022-26137,,"A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",Atlassian,"Bamboo Server,Bamboo Data Center,Bitbucket Server,Bitbucket Data Center,Confluence Server,Confluence Data Center,Crowd Server,Crowd Data Center,Crucible,Fisheye,Jira Core Server,Jira Software Server,Jira Software Data Center,Jira Service Management Server,Jira Service Management Data Center",8.8,HIGH,0.0032999999821186066,false,false,false,false,,false,false,2022-07-20T00:00:00.000Z,0 CVE-2021-43956,https://securityvulnerability.io/vulnerability/CVE-2021-43956,,The jQuery deserialize library in Fisheye and Crucible before version 4.8.9 allowed remote attackers to to inject arbitrary HTML and/or JavaScript via a prototype pollution vulnerability.,Atlassian,"Fisheye,Crucible",6.1,MEDIUM,0.0012799999676644802,false,false,false,false,,false,false,2022-03-16T01:15:00.000Z,0 CVE-2021-43955,https://securityvulnerability.io/vulnerability/CVE-2021-43955,,The /rest-service-fecru/server-v1 resource in Fisheye and Crucible before version 4.8.9 allowed authenticated remote attackers to obtain information about installation directories via information disclosure vulnerability.,Atlassian,"Fisheye,Crucible",4.3,MEDIUM,0.0008200000156648457,false,false,false,false,,false,false,2022-03-16T01:15:00.000Z,0 CVE-2021-43958,https://securityvulnerability.io/vulnerability/CVE-2021-43958,,Various rest resources in Fisheye and Crucible before version 4.8.9 allowed remote attackers to brute force user login credentials as rest resources did not check if users were beyond their max failed login limits and therefore required solving a CAPTCHA in addition to providing user credentials for authentication via a improper restriction of excess authentication attempts vulnerability.,Atlassian,"Fisheye,Crucible",9.8,CRITICAL,0.008139999583363533,false,false,false,false,,false,false,2022-03-16T01:15:00.000Z,0 CVE-2021-43957,https://securityvulnerability.io/vulnerability/CVE-2021-43957,,Affected versions of Atlassian Fisheye & Crucible allowed remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory and bypass the fix for CVE-2020-29446 due to a lack of url decoding. The affected versions are before version 4.8.9.,Atlassian,"Fisheye,Crucible",7.5,HIGH,0.005009999964386225,false,false,false,false,,false,false,2022-03-16T01:15:00.000Z,0 CVE-2021-43954,https://securityvulnerability.io/vulnerability/CVE-2021-43954,,"The DefaultRepositoryAdminService class in Fisheye and Crucible before version 4.8.9 allowed remote attackers, who have 'can add repository permission', to enumerate the existence of internal network and filesystem resources via a Server-Side Request Forgery (SSRF) vulnerability.",Atlassian,"Fisheye,Crucible",4.3,MEDIUM,0.0008200000156648457,false,false,false,false,,false,false,2022-03-14T02:15:00.000Z,0 CVE-2020-14192,https://securityvulnerability.io/vulnerability/CVE-2020-14192,,Affected versions of Atlassian Fisheye and Crucible allow remote attackers to view a product's SEN via an Information Disclosure vulnerability in the x-asen response header from Atlassian Analytics. The affected versions are before version 4.8.4.,Atlassian,"Fisheye,Crucible",4.3,MEDIUM,0.0008200000156648457,false,false,false,false,,false,false,2021-02-02T00:15:00.000Z,0 CVE-2020-29446,https://securityvulnerability.io/vulnerability/CVE-2020-29446,,Affected versions of Atlassian Fisheye & Crucible allow remote attackers to browse local files via an Insecure Direct Object References (IDOR) vulnerability in the WEB-INF directory. The affected versions are before version 4.8.5.,Atlassian,"Fisheye,Crucible",5.3,MEDIUM,0.002309999894350767,false,false,false,false,,false,false,2021-01-18T02:15:00.000Z,0 CVE-2020-14190,https://securityvulnerability.io/vulnerability/CVE-2020-14190,,Affected versions of Atlassian Fisheye/Crucible allow remote attackers to achieve Regex Denial of Service via user-supplied regex in EyeQL. The affected versions are before version 4.8.4.,Atlassian,"Fisheye,Crucible",7.5,HIGH,0.002360000042244792,false,false,false,false,,false,false,2020-11-25T23:15:00.000Z,0 CVE-2020-14191,https://securityvulnerability.io/vulnerability/CVE-2020-14191,,Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.,Atlassian,"Fisheye,Crucible",7.5,HIGH,0.0020800000056624413,false,false,false,false,,false,false,2020-11-25T22:15:00.000Z,0 CVE-2017-18112,https://securityvulnerability.io/vulnerability/CVE-2017-18112,,Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.,Atlassian,Fisheye,6.5,MEDIUM,0.00171999994199723,false,false,false,false,,false,false,2020-08-05T04:15:00.000Z,0 CVE-2020-4026,https://securityvulnerability.io/vulnerability/CVE-2020-4026,,"The CustomAppsRestResource list resource in Atlassian Navigator Links before version 3.3.23, from version 4.0.0 before version 4.3.7, from version 5.0.0 before 5.0.1, and from version 5.1.0 before 5.1.1 allows remote attackers to enumerate all linked applications, including those that are restricted or otherwise hidden, through an incorrect authorization check.",Atlassian,"Navigator Links,Crucible,Fisheye",4.3,MEDIUM,0.0008200000156648457,false,false,false,false,,false,false,2020-06-03T00:15:00.000Z,0 CVE-2020-4016,https://securityvulnerability.io/vulnerability/CVE-2020-4016,,The /plugins/servlet/jira-blockers/ resource in the crucible-jira-ril plugin in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to get the ID of configured Jira application links via an information disclosure vulnerability.,Atlassian,"Crucible,Fisheye",5.3,MEDIUM,0.00203999993391335,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2020-4015,https://securityvulnerability.io/vulnerability/CVE-2020-4015,,The /json/fe/activeUserFinder.do resource in Altassian Fisheye and Crucible before version 4.8.1 allows remote attackers to view user user email addresses via a information disclosure vulnerability.,Atlassian,"Crucible,Fisheye",4.3,MEDIUM,0.0006799999973736703,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2020-4014,https://securityvulnerability.io/vulnerability/CVE-2020-4014,,The /profile/deleteWatch.do resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to remove another user's watching settings for a repository via an improper authorization vulnerability.,Atlassian,"Crucible,Fisheye",4.3,MEDIUM,0.0008200000156648457,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2020-4013,https://securityvulnerability.io/vulnerability/CVE-2020-4013,,The review resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the review objectives.,Atlassian,"Crucible,Fisheye",5.4,MEDIUM,0.0006600000197067857,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2020-4018,https://securityvulnerability.io/vulnerability/CVE-2020-4018,,The setup resources in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to complete the setup process via a cross-site request forgery (CSRF) vulnerability.,Atlassian,"Crucible,Fisheye",8.8,HIGH,0.002139999996870756,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2020-4023,https://securityvulnerability.io/vulnerability/CVE-2020-4023,,The review coverage resource in Atlassian Fisheye and Crucible before version 4.8.2 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the committerFilter parameter.,Atlassian,"Crucible,Fisheye",5.4,MEDIUM,0.0013599999947473407,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2020-4017,https://securityvulnerability.io/vulnerability/CVE-2020-4017,,The /rest/jira-ril/1.0/jira-rest/applinks resource in the crucible-jira-ril plugin in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to get information about any configured Jira application links via an information disclosure vulnerability.,Atlassian,"Crucible,Fisheye",5.3,MEDIUM,0.00203999993391335,false,false,false,false,,false,false,2020-06-01T07:15:00.000Z,0 CVE-2019-15008,https://securityvulnerability.io/vulnerability/CVE-2019-15008,,The /plugins/servlet/branchreview resource in Atlassian Fisheye and Crucible before version 4.7.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the reviewedBranch parameter.,Atlassian,"Crucible,Fisheye",6.1,MEDIUM,0.0012199999764561653,false,false,false,false,,false,false,2019-12-11T00:00:00.000Z,0 CVE-2019-15009,https://securityvulnerability.io/vulnerability/CVE-2019-15009,,The /json/profile/removeStarAjax.do resource in Atlassian Fisheye and Crucible before version 4.8.0 allows remote attackers to remove another user's favourite setting for a project via an improper authorization vulnerability.,Atlassian,"Crucible,Fisheye",4.3,MEDIUM,0.0008200000156648457,false,false,false,false,,false,false,2019-12-11T00:00:00.000Z,0 CVE-2019-15007,https://securityvulnerability.io/vulnerability/CVE-2019-15007,,The review resource in Atlassian Fisheye and Crucible before version 4.7.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the name of a missing branch.,Atlassian,"Crucible,Fisheye",4.8,MEDIUM,0.0006600000197067857,false,false,false,false,,false,false,2019-12-11T00:00:00.000Z,0 CVE-2019-15005,https://securityvulnerability.io/vulnerability/CVE-2019-15005,,"The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.",Atlassian,"Bitbucket Server,Jira Server,Confluence Server,Crowd,Fisheye,Crucible,Bamboo",4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2019-11-08T00:00:00.000Z,0 CVE-2018-20241,https://securityvulnerability.io/vulnerability/CVE-2018-20241,,The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter.,Atlassian,Fisheye And Crucible,5.4,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2019-02-20T14:29:00.000Z,0