Page 49 of 328 results (0.013 seconds)

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

The Installation Factory installation process for IBM WebSphere Application Server (WAS) 6.0.2 on Windows, when WAS is registered as a Windows service, allows local users to obtain sensitive information by reading the logs/instconfigifwas6.log log file. El proceso de instalación de The Installation Factory en WebSphere Aplication Server (WAS) v6.0.2 en Windows, cuando WAS se registra como un servicio, permite a usuarios locales obtener información sensitiva leyendo los ficheros de registro logs/instconfigifwas6.log. • http://www-1.ibm.com/support/docview.wss?uid=swg1PK67405 http://www.securityfocus.com/bid/33849 https://exchange.xforce.ibmcloud.com/vulnerabilities/48527 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 1.9EPSS: 0%CPEs: 56EXPL: 0

PerfServlet in the PMI/Performance Tools component in IBM WebSphere Application Server (WAS) 6.0.x before 6.0.2.31, 6.1.x before 6.1.0.21, and 7.0.x before 7.0.0.1, when Performance Monitoring Infrastructure (PMI) is enabled, allows local users to obtain sensitive information by reading the (1) systemout.log and (2) ffdc files. NOTE: this is probably a duplicate of CVE-2008-5413. PerfServlet en el componente PMI/Performance Tools de IBM WebSphere Application Server (WAS) v6.0.x anterior a v6.0.2.31, v6.1.x anterior a v6.1.0.21 y v7.0.x anterior a v7.0.0.1, cuando está habilitado Performance Monitoring Infrastructure (PMI), permite a usuarios locales obtener información sensible leyendo los ficheros (1) systemout.log y (2) ffdc. NOTA: Puede que esta vulnerabilidad sea la misma que CVE-2008-5413. • http://www-01.ibm.com/support/docview.wss?uid=swg27006876 http://www-01.ibm.com/support/docview.wss?uid=swg27007951 http://www-01.ibm.com/support/docview.wss?uid=swg27014463 http://www-1.ibm.com/support/docview.wss?uid=swg1PK63886 http://www-1.ibm.com/support/docview.wss? • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The installation process for the File Transfer servlet in the System Management/Repository component in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.19 does not enable the secure version, which allows remote attackers to obtain sensitive information via unspecified vectors. El proceso de instalación en File Transfer servlet en el componente System Management/Repository en IBM WebSphere Application Server (WAS) v6.1.x anteriores a v6.1.0.19 no activa la versión segura, lo que permite a atacantes remotos obtener información sensible a través de vectores inespecificos. • http://www-01.ibm.com/support/docview.wss?uid=swg27007951 http://www-1.ibm.com/support/docview.wss?uid=swg1PK59108 http://www.securityfocus.com/bid/33700 https://exchange.xforce.ibmcloud.com/vulnerabilities/48522 • CWE-16: Configuration •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 on Windows allows remote attackers to bypass "Authorization checking" and obtain sensitive information from JSP pages via a crafted request. NOTE: this is probably a duplicate of CVE-2008-5412. IBM WebSphere Application Server (WAS) 7 anterior a v7.0.0.1 para Windows; permite a atacantes remotos evitar las "comprobaciones de Autenticación" y obtener información sensible de páginas JSP a través de una solicitud manipulada. NOTA: Puede que esta vulnerabilidad sea la misma que CVE-2008-5412. • http://www-01.ibm.com/support/docview.wss?uid=swg27014463 http://www-1.ibm.com/support/docview.wss?uid=swg1PK75248 http://www.securityfocus.com/bid/33700 https://exchange.xforce.ibmcloud.com/vulnerabilities/48528 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 0%CPEs: 109EXPL: 0

Open redirect vulnerability in the ibm_security_logout servlet in IBM WebSphere Application Server (WAS) 5.1.1.19 and earlier 5.x versions, 6.0.x before 6.0.2.33, and 6.1.x before 6.1.0.23 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the logoutExitPage feature. Vulnerabilidad de redirección abierta en ibm_security_logout servlet en IBM WebSphere Application Server (WAS) v5.1.1.19 y anteriores a las versiones v5.x, v6.0.x anterior a v6.0.2.33, y v6.1.x anterior a v6.1.0.23. permite atacantes remotos redirigir a los usuarios a paginas web de su elección y producir atacantes de phising a través de la característica logoutExitPage. • http://www-1.ibm.com/support/docview.wss?uid=swg21320242 http://www-1.ibm.com/support/docview.wss?uid=swg24021527 http://www.securityfocus.com/bid/33700 https://exchange.xforce.ibmcloud.com/vulnerabilities/47200 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •