Page 42 of 210 results (0.014 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

Kernel leak in AfpaCache module of the Fast Response Cache Accelerator (FRCA) component of IBM HTTP Server 1.3.x and Websphere 3.52 allows remote attackers to cause a denial of service via a series of malformed HTTP requests that generate a "bad request" error. • https://www.exploit-db.com/exploits/20531 http://archives.neohapsis.com/archives/bugtraq/2001-01/0079.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0061.html http://www-4.ibm.com/software/webservers/security.html http://www.securityfocus.com/bid/2175 https://exchange.xforce.ibmcloud.com/vulnerabilities/5900 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 3

Buffer overflow in IBM WebSphere web application server (WAS) allows remote attackers to execute arbitrary commands via a long Host: request header. • https://www.exploit-db.com/exploits/20229 http://archives.neohapsis.com/archives/bugtraq/2000-09/0192.html http://www-4.ibm.com/software/webservers/appserv/doc/v3022/fxpklst.htm#Security http://www.securityfocus.com/bid/1691 https://exchange.xforce.ibmcloud.com/vulnerabilities/5252 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 3

IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string. • https://www.exploit-db.com/exploits/20097 http://archives.neohapsis.com/archives/bugtraq/2000-07/0342.html http://www.securityfocus.com/bid/1500 https://exchange.xforce.ibmcloud.com/vulnerabilities/5012 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere server 3.0.2 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0263.html http://www-4.ibm.com/software/webservers/appserv/efix.html http://www.securityfocus.com/bid/1328 • CWE-178: Improper Handling of Case Sensitivity •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin. • http://www.securityfocus.com/bid/844 •