Versions
6.0.1.2
6.0.1.4
6.2.2.1
6.0
6.1.1.6
6.1.3.2
6.1.0.4
6.0.1.6
6.0.1.10
6.0.1.12
6.1.0.2
6.2.0.1
6.0.1.1
6.0.1.5
6.1
6.1.1.1
6.1.1.4
6.1.2
6.1.1.8
6.1.0.3
6.1.1.3
6.2.1
6.1.3
6.2.2
6.0.1.14
6.2.3.1
6.0.1
6.2.1.2
6.1.1.5
6.0.1.3
6.0.1.13
6.1.1.7
6.2.0.2
6.0.1.9
6.1.1.2
6.1.0.1
6.1.3.3
6.1.1
6.0.1.11
6.1.3.1
6.0.1.8
6.2.3.0
6.2.1.1
6.2
6.0.1.7
Recent CVEs
CVE-2016-9006
IBM UrbanCode Deploy 6.1 and 6.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: C1000264.
CVE-2016-6068
IBM UrbanCode Deploy could allow an authenticated user with access to the REST endpoints to access API and CLI getResource secured role properties.
CVE-2016-2942
IBM UrbanCode Deploy could allow an authenticated attacker with special permissions to craft a script on the server in a way that will cause processes to run on a remote UCD agent machine.
CVE-2016-0320
IBM UrbanCode Deploy could allow an authenticated user to modify Ucd objects due to multiple REST endpoints not properly authorizing users editing UCD objects. This could affect the behavior of legitimately triggered processes.
CVE-2016-2941
IBM UrbanCode Deploy creates temporary files during step execution that could contain sensitive information including passwords that could be read by a local user.
CVE-2016-9008
IBM UrbanCode Deploy could allow a malicious user to access the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent.
CVE-2016-8938
IBM UrbanCode Deploy could allow a user to execute code using a specially crafted file upload that would replace code on the server. This code could be executed on the UCD agent machines that host customer's production applications.