Page 30 of 149 results (0.008 seconds)

CVSS: 5.8EPSS: 0%CPEs: 44EXPL: 0

Open redirect vulnerability in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.19 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the logoutExitPage parameter. Vulnerabilidad "Open redirect" en IBM WebSphere Application Server (WAS) v6.1 anterior a v6.1.0.39 y v7.0 anterior a 7.0.0.19 permite a atacantes remotos redirigir a los usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing a través del parámetro logoutExitPage. • http://www.ibm.com/support/docview.wss?uid=swg1PM35701 http://www.ibm.com/support/docview.wss?uid=swg1PM42436 https://exchange.xforce.ibmcloud.com/vulnerabilities/68570 • CWE-20: Improper Input Validation •

CVSS: 2.1EPSS: 0%CPEs: 44EXPL: 0

IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.19 allows local users to obtain sensitive stack-trace information via a crafted Administration Console request. IBM WebSphere Application Server (WAS) v6.1 y anteriores a v6.1.0.39 y v7 y anteriores a v7.0.0.19 permite a usuarios locales obtener pilas de información de seguimiento a través de una solicitud diseñada para ello de la consola de administración. • http://www.ibm.com/support/docview.wss?uid=swg1PM36620 http://www.ibm.com/support/docview.wss?uid=swg1PM42436 http://www.securityfocus.com/bid/48709 https://exchange.xforce.ibmcloud.com/vulnerabilities/68571 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 46EXPL: 0

IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.17 uses a weak WS-Security XML encryption algorithm, which makes it easier for remote attackers to obtain plaintext data from a (1) JAX-RPC or (2) JAX-WS Web Services request via unspecified vectors related to a "decryption attack." El servidor de aplicaciones IBM WebSphere (WAS) 6.1 anteriores a 6.1.0.39 y 7.0 anteriores a 7.0.0.17 utiliza un algoritmo de encriptación XML WS-Security débil, lo que facilita a atacantes remotos obtener texto plano a partir de una petición de Web Services (1) JAX-RPC o (2) JAX-WS a través de vectores sin especificar relacionados con un "ataque de desencriptación". • http://www-01.ibm.com/support/docview.wss?uid=swg1PM34841 http://www-01.ibm.com/support/docview.wss?uid=swg24029632 https://exchange.xforce.ibmcloud.com/vulnerabilities/67115 • CWE-310: Cryptographic Issues •

CVSS: 6.8EPSS: 1%CPEs: 100EXPL: 0

IBM WebSphere Application Server (WAS) 6.0.x through 6.0.2.43, 6.1.x before 6.1.0.37, and 7.0.x before 7.0.0.17 on z/OS, when a Local OS user registry or Federated Repository with RACF adapter is used, allows remote attackers to obtain unspecified application access via unknown vectors. IBM WebSphere Application Server (WAS) v6.0.x hasta v6.0.2.43, v6.1.x anterior a v6.1.0.37, y v7.0.x anterior a v7.0.0.17 sobre z/OS, cuando un usuario registrado en Locla OS o Federated Repository con adaptador RACF está usada, permite a atacantes remotos obtener acceso a aplicaciones no especificadas a través de vectores desconocidos. • http://secunia.com/advisories/43965 http://www-01.ibm.com/support/docview.wss?uid=swg21473989 http://www.ibm.com/support/docview.wss?uid=swg1PM35478 http://www.ibm.com/support/docview.wss?uid=swg1PM35480 http://www.ibm.com/support/docview.wss?uid=swg1PM35545 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •