Vulnerabilities (CVE)

Filtered by vendor Atlassian Subscribe
Filtered by product Fisheye
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-14190 1 Atlassian 2 Crucible, Fisheye 2021-07-21 5.0 MEDIUM 7.5 HIGH
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to achieve Regex Denial of Service via user-supplied regex in EyeQL. The affected versions are before version 4.8.4.
CVE-2020-14191 1 Atlassian 2 Crucible, Fisheye 2021-07-21 5.0 MEDIUM 7.5 HIGH
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.
CVE-2017-9512 1 Atlassian 2 Crucible, Fisheye 2020-11-25 5.0 MEDIUM 7.5 HIGH
The mostActiveCommitters.do resource in Atlassian Fisheye and Crucible, before version 4.4.1 allows anonymous remote attackers to access sensitive information, for example email addresses of committers, as it lacked permission checks.
CVE-2017-9511 2 Atlassian, Microsoft 3 Crucible, Fisheye, Windows 2020-11-25 5.0 MEDIUM 7.5 HIGH
The MultiPathResource class in Atlassian Fisheye and Crucible, before version 4.4.1 allows anonymous remote attackers to read arbitrary files via a path traversal vulnerability when Fisheye or Crucible is running on the Microsoft Windows operating system.
CVE-2020-4018 1 Atlassian 2 Crucible, Fisheye 2020-06-02 6.8 MEDIUM 8.8 HIGH
The setup resources in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to complete the setup process via a cross-site request forgery (CSRF) vulnerability.
CVE-2018-13399 1 Atlassian 2 Crucible, Fisheye 2019-10-03 4.6 MEDIUM 7.8 HIGH
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-5223 1 Atlassian 2 Crucible, Fisheye 2018-04-24 6.5 MEDIUM 7.2 HIGH
Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability.