I saw a workaround using JQL Queries in this documentation, but it doesn't actually work. The security containers are very important to our devs knowing at a glance where to go to fix the vulnerability...
...canner doesn't. It generates a report only if it succeeds, but I want the pipeline to fail in case a vulnerability needs to be addressed. Can the code for the pipe be changed to something like ......
Hi I'm trying to build some simple automation to set the priority and due dates based on severity of the vulnerabilities. It appears that vulnerability values cannot be used in automation....
Hi, Is there a way to access code insight report generated after bitbucket dependency scan? I want to upload this insights report to artifact so that i can access in the next steps in the pi...
Specific error message: Status: Downloaded newer image for bitbucketpipelines/bitbucket-dependency-scanner:0.1.4 time="2024-11-19T16:21:25Z" level=error msg="error waiting for ...
...nalyzer (2 seconds) [INFO] Finished False Positive Analyzer (0 seconds) [INFO] Finished NVD CVE Analyzer (0 seconds) [INFO] Finished Sonatype OSS Index Analyzer (0 seconds) [INFO] Finished Vulnerability...
...o identify and assess possible threats to and vulnerabilities of their products. The preferred risk evaluation method is the well-known Common Vulnerability Scoring System (CVSS), recommended by both t...
while im using the pipe bitbucket dependency scanner its getting failed.
What is CVSS and when to use it? The Common Vulnerability Scoring System (CVSS) is a standardized framework for rating the severity of security vulnerabilities. The CVSS was developed a...
Hello Dear All, I want to create Jira Automation Rule that would link many similar Vulnerabilities found (the same vulnerability types) into one Jira issue. If the jira issue is already c...
Hello, We have Snyk integration with for new vulnerabilities and already defined automation rule to create new ticket once new vulnerability is detected. BUT - I can't find how to show the link\ f...
...an you share if you have the same vulnerability ?
Hi All I have a vulnerable issue for Path Traversal, how can I fix this issue with on-premise environment (v7.6.13) [JSDSERVER-6589] URL path traversal allows information disclosure - CVE-2019...
...og4j issue became public and experts predict that the Log4j security vulnerability could impact the entire internet taking years to be fixed, simply because 95% of Java programs use Log4j. ` (https://w...
Hello Support. I'm a security analyst and I work directly with vulnerabilities. According to your text, this vulnerability (CVE-2020-36239 ) only affects the products: Jira Data C...
I received an alert from a 3rd party security vendor who scans my environment indicating my company status page has a vulnerability "SQL injection may be possible" and tagged it as a high risk. N...
Hi Team, As per recent scan we found out that there are lot of places where Atlassian bundled plugins are using log4j 1.2.17 inside. We are using Jira Service Management 8.13. Any suggestions how ...
Hi Atlassian Support team, We followed the steps to check our Jira & Confluence Server to identify the Log4J vulnerability. However, we just found the files with WEB-INF/lib/log4j2-stacktrace-o...
I see stash-java-client-core latest version uses log4j 1.X. I am aware log4j 1.X is not vulnerable to the Zero Day vulnerability but still I prefer to upgrade to 2.17 Has anyone found h...
On December 9, Atlassian became aware of the vulnerability CVE-2021-44228 - Log4j. Impact on Cloud Products This vulnerability has been mitigated for all Atlassian cloud products p...
...ira Cross-Site Scripting Vulnerability(JRASERVER-71652) Atlassian Jira Server And Data Center Improper Authentication Vulnerability(JRASERVER-72029) Atlassian Jira Server And Data Center Privilege E...
I have a Confluence (Server) 10 Users: Starter License for wich I see that the support expired on 27 Feb 2021. I have been hit by CVE-2021-26084 and updated to the latest version; now it ...
...enter. "Based on our investigation, this was a known vulnerability and we had issued patches two years ago to address this issue. As always, we recommend that our server and data center customers a...
Hello, I've been reported the next Low vulnerability: "Open windows with normal hrefs with the tag target="_blank" can modify window.opener.location and replace the parent webpage with something e...
Check out Adrian! Bad actors attack a new web application every 39 seconds. Even with so much of the world on pause in a time of unprecedented change and uncertainty, cybercrime continues to thrive...
Copied to clipboard
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.