Page 40 of 405 results (0.013 seconds)

CVSS: 8.1EPSS: 7%CPEs: 1EXPL: 0

03 Jun 2005 — Buffer overflow in the administrative console in IBM WebSphere Application Server 5.x, when the global security option is enabled, allows remote attackers to execute arbitrary code. • http://marc.info/?l=bugtraq&m=111817727120752&w=2 •

CVSS: 7.5EPSS: 2%CPEs: 20EXPL: 1

16 Apr 2005 — IBM WebSphere Application Server 6.0 and earlier, when sharing the document root of the web server, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via an HTTP request with an invalid Host header, which causes the page to be processed by the web server instead of the JSP engine. • https://www.exploit-db.com/exploits/25420 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

15 Feb 2005 — Unknown vulnerability in IBM Websphere Application Server 5.0, 5.1, and 6.0 when running on Windows, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via a crafted URL that causes the page to be processed by the file serving servlet instead of the JSP engine. Vulnerabilidad desconocida en IBM Websphere Application Server 5.0, 5.1, y 6.0 cuando es ejecutado en Windows, permite a atacantes remotos obtener el código fuente de Java Server Pages (.jsp) mediante una URL alterada que ... • http://secunia.com/advisories/14274 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2003 — IBM WebSphere Advanced Server Edition 4.0.4 uses a weak encryption algorithm (XOR and base64 encoding), which allows local users to decrypt passwords when the configuration file is exported to XML. • http://securityreason.com/securityalert/3277 • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 1

11 Oct 2002 — IBM Websphere 4.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP request with long HTTP headers, such as "Host". IBM Websphere 4.0.3 permite a atacantes remotos causar una denegación de servicio (caída), y posiblemente ejecutar código arbitrario mediante una petición HTTP con cabeceras HTTP largas, como "Host". • ftp://ftp.software.ibm.com/software/websphere/appserv/support/fixes/pq62144/readme.txt •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

13 Dec 2001 — IBM Websphere Application Server 3.5.3 and earlier stores a password in cleartext in the sas.server.props file, which allows local users to obtain the passwords via a JSP script. IBM Websphere Application Server 3.5.3 y versiones anteriores almacenan una contraseña en formato textual en el fichero sas.server.props, lo que permite a usuarios locales la obtención de dicha contraseña mediante una rutina JSP. • http://www.iss.net/security_center/static/7698.php •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

22 Nov 2001 — Cross-site scripting vulnerability in IBM WebSphere 3.02 and 3.5 FP2 allows remote attackers to execute Javascript by inserting the Javascript into (1) a request for a .JSP file, or (2) a request to the webapp/examples/ directory, which inserts the Javascript into an error page. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

19 Sep 2001 — IBM WebSphere Application Server 3.02 through 3.53 uses predictable session IDs for cookies, which allows remote attackers to gain privileges of WebSphere users via brute force guessing. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0234.html •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

24 May 2001 — IBM Websphere/NetCommerce3 3.1.2 allows remote attackers to determine the real path of the server by directly calling the macro.d2w macro with a NOEXISTINGHTMLBLOCK argument. • http://www.securityfocus.com/archive/1/176100 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 3

24 May 2001 — IBM Websphere/NetCommerce3 3.1.2 allows remote attackers to cause a denial of service by directly calling the macro.d2w macro with a long string of %0a characters. • https://www.exploit-db.com/exploits/20753 •