Vulnerabilites related to tm_software - tempo
cve-2012-2927
Vulnerability from cvelistv5
Published
2012-05-22 15:00
Modified
2024-08-06 19:50
Severity ?
Summary
The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.
References
http://secunia.com/advisories/49166third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/81993vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/53595vdb-entry, x_refsource_BID
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49166",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49166"
          },
          {
            "name": "81993",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/81993"
          },
          {
            "name": "53595",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53595"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
          },
          {
            "name": "jira-xml-dos(75697)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49166",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49166"
        },
        {
          "name": "81993",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/81993"
        },
        {
          "name": "53595",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53595"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
        },
        {
          "name": "jira-xml-dos(75697)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-2927",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49166",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49166"
            },
            {
              "name": "81993",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/81993"
            },
            {
              "name": "53595",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53595"
            },
            {
              "name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
              "refsource": "CONFIRM",
              "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
            },
            {
              "name": "jira-xml-dos(75697)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-2927",
    "datePublished": "2012-05-22T15:00:00",
    "dateReserved": "2012-05-22T00:00:00",
    "dateUpdated": "2024-08-06T19:50:05.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-05-22 15:55
Modified
2024-11-21 01:39
Severity ?
Summary
The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB50394-E845-4289-AA14-C00297082069",
              "versionEndIncluding": "6.4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4ECAC4-445B-4774-97E2-0E80DD26931A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF54428-E8AB-4E0C-AC01-84006DB7DEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB5C44B-2007-4867-B382-778ECD60B07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406F1724-FB6A-4567-AACF-EF00F11247EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5416C9A-0322-4E27-8E0D-ACB35A1CCC44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6882C3-6196-4627-ADEF-1415F5E39F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3496377F-EE1E-4EC6-A20E-8127E623E8D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "022D3DF0-1BA4-4B11-9F38-E82535852A8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7150D122-12F1-4700-B787-8E1D95F860CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D5BC919-3A24-4B3D-A0AF-3B5522E2F399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C58535-2AD1-4199-92CC-27E6659C0E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "485A3879-8DD1-4D0B-A927-F8D0B6AF4BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8730BAB-C29D-4FAA-BCAB-7483EBB3DD8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B02AE6-D121-4CF4-AA27-7804568B3BDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA4D919B-B553-465D-981F-70582CF19085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AD7F90-F678-4247-8E42-88487610DD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C223C4-AD27-4D7C-9A49-4561DF0C6177",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B700907-A927-4E3C-88A7-18B832F3D206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0EF883-4B41-468A-80DC-C82D350F1B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C78708-BC96-4ABA-A8FD-E128E84E5EE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A696CC2B-9576-40C5-93E1-B6B9C680A7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E154941-85BC-45E6-AB89-D9B7C7DD4698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A839A4-8064-49FA-A78D-5094F957A0A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3546E40E-E222-4D0E-A6B4-CC1E868F2E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E666ADD5-AFE3-42D0-ADB1-D13611AAF7FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D42E30-DC65-4CCC-81E5-021265CC980A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A8DBAED-975D-4582-B7B9-8638B61785DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D66B4734-890D-4F3D-888C-F760C228265B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DF51F9F-5FAF-4A51-93A4-B8AE4EFA6678",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "60ADCA86-451A-4755-9EA4-BA56FA40BFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51E4187-C8A8-4901-874B-F5FBC22C6C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:5.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "77826380-60EB-4BD3-9F2D-5B6225357C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1EA4541-9C99-4C33-BF1B-869396839AB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4A3D989-553E-4A83-9385-29726AB5329F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AE70D8E-4346-47E4-AFE2-4D8E11E03D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A833804A-C11E-40AE-8288-35B10EE44B57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "070991DB-443C-4EE8-B073-CE8241B2F909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.1.1:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "00000281-FDC3-4061-994A-2198988B3A7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B6AC158-49C0-4B03-AF6D-04D1500CB2E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.1-jira42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E7EA8D-7575-4B60-BE52-96E5FDF25AC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.2:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "2F19625C-C38E-4256-A67A-F0D29B96C066",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.3:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "34E764E0-194C-472B-8437-0BCDEB135411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.4:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "981A4F7B-7947-4CDC-A771-BD054CE4F118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.5:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "5523392F-E133-45FF-B2EA-92FED4504C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.6:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "72F72EBF-5DE6-4BCA-91C8-872D16E38FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.2.7:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "A35A73DC-F17F-48CA-B454-724A1EADC6B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.3.1:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "F6FB5054-BECD-4341-BA05-6805F5B4224B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.4:jira42:*:*:*:*:*:*",
              "matchCriteriaId": "BA3E6A01-4BB5-4891-AB31-102C45884756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "42DA35D2-A969-4202-8449-020630E8CC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C42F73-FFA0-4116-B2CA-D0A8554A6315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5AD19BB-2640-4919-8EB9-06612E45D527",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F2708B03-8B48-4315-9372-04A1E5EBB15E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "81CA7C8D-4009-4455-9235-268E4C76632C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51037974-8FD5-4B4E-A92F-8E4EEA58B093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo6.3.0:jira42:*:*:*:*:*:*:*",
              "matchCriteriaId": "779DD283-2C65-48B4-AD41-3B68BB4B0240",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tm_software:tempo6.3.2:jira42:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C802033-FC5A-470D-BB35-E96144B11707",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:atlassian:jira:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8CAC456-22A9-4D0B-9642-96123EE9206A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "El complemento \"Software TM Tempo\" para Atlassian JIRA antes de v6.4.3.1 , v6.5.x antes de v6.5.0.2 y v7.x antes de v7.0.3 no tiene restringe correctamente las capacidades de los analizadores XML de terceros, lo que permite provocar una denegaci\u00f3n de servicio (por excesivo consumo de recursos) a usuarios remotos autenticados a trav\u00e9s de vectores no especificados.\r\n"
    }
  ],
  "id": "CVE-2012-2927",
  "lastModified": "2024-11-21T01:39:57.370",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-22T15:55:02.900",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/81993"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49166"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53595"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/81993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}