mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-31 10:41:57 +00:00
- Synchronized data.
This commit is contained in:
parent
d340e47fae
commit
b0967df652
@ -35,7 +35,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affe cted device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it."
|
||||
"value" : "A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,78 +1,78 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@atlassian.com",
|
||||
"DATE_PUBLIC": "2018-03-28T00:00:00",
|
||||
"ID": "CVE-2018-5223",
|
||||
"STATE": "PUBLIC"
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@atlassian.com",
|
||||
"DATE_PUBLIC" : "2018-03-28T00:00:00",
|
||||
"ID" : "CVE-2018-5223",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "Fisheye and Crucible",
|
||||
"version": {
|
||||
"version_data": [
|
||||
"product_name" : "Fisheye and Crucible",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value": "4.4.6",
|
||||
"version_affected" : "<"
|
||||
"version_affected" : "<",
|
||||
"version_value" : "4.4.6"
|
||||
},
|
||||
{
|
||||
"version_value": "4.5.0",
|
||||
"version_affected" : ">="
|
||||
"version_affected" : ">=",
|
||||
"version_value" : "4.5.0"
|
||||
},
|
||||
{
|
||||
"version_value": "4.5.3",
|
||||
"version_affected" : "<"
|
||||
"version_affected" : "<",
|
||||
"version_value" : "4.5.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Atlassian"
|
||||
"vendor_name" : "Atlassian"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability."
|
||||
"lang" : "eng",
|
||||
"value" : "Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description": [
|
||||
"description" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Argument Injection"
|
||||
"lang" : "eng",
|
||||
"value" : "Argument Injection"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/FE-7014"
|
||||
"url" : "https://confluence.atlassian.com/x/Zi5sO"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/CRUC-8181"
|
||||
"url" : "https://confluence.atlassian.com/x/aS5sO"
|
||||
},
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/x/aS5sO"
|
||||
"url" : "https://jira.atlassian.com/browse/CRUC-8181"
|
||||
},
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/x/Zi5sO"
|
||||
"url" : "https://jira.atlassian.com/browse/FE-7014"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,78 +1,77 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@atlassian.com",
|
||||
"DATE_PUBLIC": "2018-03-28T00:00:00",
|
||||
"ID": "CVE-2018-5224",
|
||||
"STATE": "PUBLIC"
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "security@atlassian.com",
|
||||
"DATE_PUBLIC" : "2018-03-28T00:00:00",
|
||||
"ID" : "CVE-2018-5224",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name": "Bamboo",
|
||||
"version": {
|
||||
"version_data": [
|
||||
"product_name" : "Bamboo",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value": "2.7.1",
|
||||
"version_affected": ">="
|
||||
"version_affected" : ">=",
|
||||
"version_value" : "2.7.1"
|
||||
},
|
||||
{
|
||||
"version_value": "6.3.3",
|
||||
"version_affected": "<"
|
||||
"version_affected" : "<",
|
||||
"version_value" : "6.3.3"
|
||||
},
|
||||
{
|
||||
"version_value": "6.4.0",
|
||||
"version_affected": ">="
|
||||
"version_affected" : ">=",
|
||||
"version_value" : "6.4.0"
|
||||
},
|
||||
{
|
||||
"version_value": "6.4.1",
|
||||
"version_affected": "<"
|
||||
"version_affected" : "<",
|
||||
"version_value" : "6.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Atlassian"
|
||||
"vendor_name" : "Atlassian"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan in Bamboo that has a non-linked Mercurial repository, or create a plan in Bamboo either globally or in a project using Bamboo Specs can can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability."
|
||||
"lang" : "eng",
|
||||
"value" : "Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan in Bamboo that has a non-linked Mercurial repository, or create a plan in Bamboo either globally or in a project using Bamboo Specs can can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description": [
|
||||
"description" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Argument Injection"
|
||||
"lang" : "eng",
|
||||
"value" : "Argument Injection"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/BAM-19743"
|
||||
"url" : "https://confluence.atlassian.com/x/PS9sO"
|
||||
},
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/x/PS9sO"
|
||||
"url" : "https://jira.atlassian.com/browse/BAM-19743"
|
||||
}
|
||||
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -56,7 +56,7 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://communities.ca.com/community/product-vulnerability-response/blog/2018/03/28/ca20180328-01-security-notice-for-ca-api-developer-portal"
|
||||
"url" : "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180328-01--security-notice-for-ca-api-developer-portal.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user