Page 28 of 145 results (0.010 seconds)

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 0

Unspecified vulnerability in the Default Messaging Component in IBM WebSphere Application Server (WAS) 6.1.0.7 and earlier allows remote attackers to cause a denial of service related to a thread hang, and possibly related to a "TCP issue," or to MPAlarmThread and a resultant memory leak. Vulnerabilidad no especificada en en el componente Default Messaging Component de IBM WebSphere Application Server(WAS) 6.1.0.7 y anteriores permite a atacantes remotos provocar una denegación de servicio relacionado con un cuelgue de un hilo, y posiblemente relacionado con un "problema TCP", o con MPAlarmThread y una fuga de memoria resultante. • http://osvdb.org/41614 http://secunia.com/advisories/25704 http://www-1.ibm.com/support/docview.wss?uid=swg27007951 http://www.securityfocus.com/bid/24505 http://www.vupen.com/english/advisories/2007/2234 https://exchange.xforce.ibmcloud.com/vulnerabilities/34903 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the Default Messaging Component in IBM WebSphere Application Server (WAS) 6.1.0.7 and earlier has unknown impact and attack vectors, related to "incorrect authorization on a remote interface to the SDO repository." Vulnerabilidad no especificada en en el componente Default Messaging Component de IBM WebSphere Application Server(WAS) 6.1.0.7 y anteriores tiene impacto y vectores de ataque desconocidos, relacionados con la "autorización incorrecta en una interfaz remota con el repositorio SDO". • http://osvdb.org/41613 http://secunia.com/advisories/25704 http://www-1.ibm.com/support/docview.wss?uid=swg27007951 http://www.securityfocus.com/bid/24505 http://www.vupen.com/english/advisories/2007/2234 https://exchange.xforce.ibmcloud.com/vulnerabilities/34901 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Java Message Service (JMS) in IBM WebSphere Application Server (WAS) before 6.1.0.7 allows attackers to cause a denial of service via unknown vectors involving the "double release [of] a bytebuffer input stream," possibly a double free vulnerability. Java Message Service (JMS) en IBM WebSphere Application Server (WAS) versiones anteriores a 6.1.0.7, permite a atacantes causar una denegación de servicio por medio de vectores desconocidos que implican la "double release [of] a bytebuffer input stream”, posiblemente una vulnerabilidad de doble liberación. • http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www.vupen.com/english/advisories/2007/1282 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in the Servlet Engine/Web Container in IBM WebSphere Application Server (WAS) before 6.1.0.7 has unknown impact and attack vectors. Vulnerabilidad no especificada en Servlet Engine/Web Container en IBM WebSphere Application Server (WAS) anterior a 6.1.0.7 tiene un impacto desconocido y vectores de ataque. • http://osvdb.org/41605 http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www-1.ibm.com/support/search.wss?rs=0&q=PK36447&apar=only http://www.vupen.com/english/advisories/2007/1282 https://exchange.xforce.ibmcloud.com/vulnerabilities/33471 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere Application Server 6.1.0 before Fix Pack 3 (6.1.0.3) does not perform EAL4 authentication checks at the proper time during "registering of response operation," which has unknown impact and attack vectors. IBM WebSphere Application Server 6.1.0 anterior al Fix Pack 3 (6.1.0.3) no realiza las comprobaciones de autenticación EAL4 en el momento adecuado durante el "registro de la operación de respuesta", lo cual tiene impacto y vectores de ataque desconocidos. • http://secunia.com/advisories/23028 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24013830 http://www-1.ibm.com/support/docview.wss?uid=swg27007951 http://www-1.ibm.com/support/search.wss?rs=0&q=PK29847&apar=only http://www.securityfocus.com/bid/21204 http://www.vupen.com/english/advisories/2006/4639 •