Page 15 of 85 results (0.010 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Java Message Service (JMS) in IBM WebSphere Application Server (WAS) before 6.1.0.7 allows attackers to cause a denial of service via unknown vectors involving the "double release [of] a bytebuffer input stream," possibly a double free vulnerability. Java Message Service (JMS) en IBM WebSphere Application Server (WAS) versiones anteriores a 6.1.0.7, permite a atacantes causar una denegación de servicio por medio de vectores desconocidos que implican la "double release [of] a bytebuffer input stream”, posiblemente una vulnerabilidad de doble liberación. • http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www.vupen.com/english/advisories/2007/1282 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in the Servlet Engine/Web Container in IBM WebSphere Application Server (WAS) before 6.1.0.7 has unknown impact and attack vectors. Vulnerabilidad no especificada en Servlet Engine/Web Container en IBM WebSphere Application Server (WAS) anterior a 6.1.0.7 tiene un impacto desconocido y vectores de ataque. • http://osvdb.org/41605 http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www-1.ibm.com/support/search.wss?rs=0&q=PK36447&apar=only http://www.vupen.com/english/advisories/2007/1282 https://exchange.xforce.ibmcloud.com/vulnerabilities/33471 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

CRLF injection vulnerability in IBM WebSphere Application Server (WAS) before 6.0.2.19 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a single CRLF sequence in a context that is not a valid multi-line header. Vulnerabilidad de inyección de retornos de carro y saltos de línea en BM WebSphere Application Server (WAS) versiones anteriores a 6.0.2.19 permite a atacantes remotos inyectar cabeceras HTML de su elección y conducir respuestas HTTP fraccionando ataques mediante una secuencia de retornos de carro y saltos de línea en un contexto que no es una cabecera válida multi-línea. • http://osvdb.org/34484 http://secunia.com/advisories/24552 http://www-1.ibm.com/support/docview.wss?uid=swg1PK39732 http://www.securityfocus.com/bid/23086 http://www.securitytracker.com/id?1017806 http://www.vupen.com/english/advisories/2007/1062 https://exchange.xforce.ibmcloud.com/vulnerabilities/33123 •

CVSS: 10.0EPSS: 2%CPEs: 20EXPL: 0

Unspecified vulnerability in the Utility Classes for IBM WebSphere Application Server (WAS) before 5.1.1.13 and 6.x before 6.0.2.17 has unknown impact and attack vectors. Vulnerabilidad no especificada en Utility Classes para IBM WebSphere Application Server (WAS) anterior a 5.1.1.13 y 6.x anterior a 6.0.2.17 tiene impacto y vectores de ataque desconocidos. • http://secunia.com/advisories/23386 http://secunia.com/advisories/23414 http://www-1.ibm.com/support/docview.wss?uid=swg1PK29725 http://www-1.ibm.com/support/docview.wss?uid=swg27006876 http://www-1.ibm.com/support/docview.wss?uid=swg27006879 http://www.securityfocus.com/bid/21608 http://www.securityfocus.com/bid/21636 http://www.vupen.com/english/advisories/2006/5017 http://www.vupen.com/english/advisories/2006/5050 https://exchange.xforce.ibmcloud.com/vulnerabilities/30903 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in IBM WebSphere Application Server before 6.1.0.2 has unspecified impact and attack vectors, related to a "possible security exposure," aka PK29360. Vulnerabilidad no especificada en IBM WebSphere Application Server anterior a 6.1.0.2 tiene impacto y vectores de ataque no especificados, relacionado con una "posible exposición de seguridad", también conocido como PK29360. • http://secunia.com/advisories/22372 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24013142 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951 http://www-1.ibm.com/support/search.wss?rs=0&q=PK29360&apar=only http://www.vupen.com/english/advisories/2006/4000 •