Page 14 of 70 results (0.010 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

IBM WebSphere Application Server 3.02 through 3.53 uses predictable session IDs for cookies, which allows remote attackers to gain privileges of WebSphere users via brute force guessing. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0234.html http://www.osvdb.org/5492 http://www14.software.ibm.com/webapp/download/postconfig.jsp?id=4000805&pf=Multi-Platform&v=3.0.2&e=Standard+%26+Advanced+Editions&cat=&s=p https://exchange.xforce.ibmcloud.com/vulnerabilities/7153 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 3

Buffer overflow in IBM WebSphere web application server (WAS) allows remote attackers to execute arbitrary commands via a long Host: request header. • https://www.exploit-db.com/exploits/20229 http://archives.neohapsis.com/archives/bugtraq/2000-09/0192.html http://www-4.ibm.com/software/webservers/appserv/doc/v3022/fxpklst.htm#Security http://www.securityfocus.com/bid/1691 https://exchange.xforce.ibmcloud.com/vulnerabilities/5252 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 3

IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string. • https://www.exploit-db.com/exploits/20097 http://archives.neohapsis.com/archives/bugtraq/2000-07/0342.html http://www.securityfocus.com/bid/1500 https://exchange.xforce.ibmcloud.com/vulnerabilities/5012 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere server 3.0.2 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0263.html http://www-4.ibm.com/software/webservers/appserv/efix.html http://www.securityfocus.com/bid/1328 • CWE-178: Improper Handling of Case Sensitivity •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin. • http://www.securityfocus.com/bid/844 •