Page 39 of 207 results (0.014 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

IBM WebSphere Application Server 5.0.x before 5.02.15, 5.1.x before 5.1.1.8, and 6.x before fixpack V6.0.2.5, when session trace is enabled, records a full URL including the queryString in the trace logs when an application encodes a URL, which could allow attackers to obtain sensitive information. • http://securitytracker.com/id?1015134 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27004980 http://www-1.ibm.com/support/docview.wss?uid=swg24010781 http://www.securityfocus.com/bid/15303 http://www.vupen.com/english/advisories/2005/2291 https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/OPTIONS • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 15%CPEs: 2EXPL: 1

IBM WebSphere 5.1 and WebSphere 5.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebSphere to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." • http://seclists.org/lists/bugtraq/2005/Jun/0025.html http://securitytracker.com/id?1014367 http://www.securiteam.com/securityreviews/5GP0220G0U.html http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/42898 •

CVSS: 7.5EPSS: 51%CPEs: 1EXPL: 0

Buffer overflow in the administrative console in IBM WebSphere Application Server 5.x, when the global security option is enabled, allows remote attackers to execute arbitrary code. • http://marc.info/?l=bugtraq&m=111817727120752&w=2 http://secunia.com/advisories/15598 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24009775 http://www.appsecinc.com/resources/alerts/general/WEBSPHERE-001.html http://www.osvdb.org/17041 •

CVSS: 5.0EPSS: 2%CPEs: 20EXPL: 1

IBM WebSphere Application Server 6.0 and earlier, when sharing the document root of the web server, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via an HTTP request with an invalid Host header, which causes the page to be processed by the web server instead of the JSP engine. • https://www.exploit-db.com/exploits/25420 http://marc.info/?l=bugtraq&m=111342594129109&w=2 http://secunia.com/advisories/14962 http://securitytracker.com/id?1013697 http://www.osvdb.org/15501 http://www.securityfocus.com/bid/13160 https://exchange.xforce.ibmcloud.com/vulnerabilities/20099 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in IBM Websphere Application Server 5.0, 5.1, and 6.0 when running on Windows, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via a crafted URL that causes the page to be processed by the file serving servlet instead of the JSP engine. Vulnerabilidad desconocida en IBM Websphere Application Server 5.0, 5.1, y 6.0 cuando es ejecutado en Windows, permite a atacantes remotos obtener el código fuente de Java Server Pages (.jsp) mediante una URL alterada que hace que la página sea procesada por el fichero que sirve el servlet en lugar de por el motor JSP. • http://secunia.com/advisories/14274 http://www-1.ibm.com/support/docview.wss?uid=swg24008814 http://www-1.ibm.com/support/docview.wss?uid=swg24008815 •