Page 69 of 424 results (0.011 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 on Windows allows remote attackers to bypass "Authorization checking" and obtain sensitive information from JSP pages via a crafted request. NOTE: this is probably a duplicate of CVE-2008-5412. IBM WebSphere Application Server (WAS) 7 anterior a v7.0.0.1 para Windows; permite a atacantes remotos evitar las "comprobaciones de Autenticación" y obtener información sensible de páginas JSP a través de una solicitud manipulada. NOTA: Puede que esta vulnerabilidad sea la misma que CVE-2008-5412. • http://www-01.ibm.com/support/docview.wss?uid=swg27014463 http://www-1.ibm.com/support/docview.wss?uid=swg1PK75248 http://www.securityfocus.com/bid/33700 https://exchange.xforce.ibmcloud.com/vulnerabilities/48528 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.6EPSS: 0%CPEs: 73EXPL: 0

Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down. Vulnerabilidad no especificada en IBM WebSphere Aplication Server (WAS) v5.1.x anteriores a v5.1.1.19, v6.1.0.19, cuando el pluging buffering_content de Web Server está activo está disponible, permite a atacantes provocar una denegación de servicio (caída de demonio) a través de vectores no definidos, relativo a un mal manejo o fallos en la lectura del cliente, en los cuales un cliente recibe muchas respuestas error 500 de HTTP y los servidores bacjend son etiquetados como caídos de forma errónea. • http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161 http://www-01.ibm.com/support/docview.wss?uid=swg27006879 http://www-01.ibm.com/support/docview.wss?uid=swg27007033 http://www-01.ibm.com/support/docview.wss?uid=swg27007951 http://www-1.ibm.com/support/docview.wss? •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The installation process for the File Transfer servlet in the System Management/Repository component in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.19 does not enable the secure version, which allows remote attackers to obtain sensitive information via unspecified vectors. El proceso de instalación en File Transfer servlet en el componente System Management/Repository en IBM WebSphere Application Server (WAS) v6.1.x anteriores a v6.1.0.19 no activa la versión segura, lo que permite a atacantes remotos obtener información sensible a través de vectores inespecificos. • http://www-01.ibm.com/support/docview.wss?uid=swg27007951 http://www-1.ibm.com/support/docview.wss?uid=swg1PK59108 http://www.securityfocus.com/bid/33700 https://exchange.xforce.ibmcloud.com/vulnerabilities/48522 • CWE-16: Configuration •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Unspecified vulnerability in the IBM Asynchronous I/O (aka AIO or libibmaio) library in the Java Message Service (JMS) component in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.17 on AIX 5.3 allows attackers to cause a denial of service (daemon crash) via vectors related to the aio_getioev2 and getEvent methods. Vulnerabilidad inespecifica en la libreria IBM Asynchronous I/O (tambien conocido como AIO o libibmaio) en el componente Java Message Service (JMS) en IBM WebSphere Application Server (WAS) v6.1.x anteriores a v6.1.0.7 en AIX v5.3 permite a los atacantes producir una denegacion de servicio (caida de demonio) a traves de vectores relacionados con los metodos "aio_getioev2" y "getEvent". • http://www-01.ibm.com/support/docview.wss?rs=0&uid=swg24019205 http://www-01.ibm.com/support/docview.wss?uid=swg27007951 http://www.securityfocus.com/bid/33700 https://exchange.xforce.ibmcloud.com/vulnerabilities/48525 •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

The Installation Factory installation process for IBM WebSphere Application Server (WAS) 6.0.2 on Windows, when WAS is registered as a Windows service, allows local users to obtain sensitive information by reading the logs/instconfigifwas6.log log file. El proceso de instalación de The Installation Factory en WebSphere Aplication Server (WAS) v6.0.2 en Windows, cuando WAS se registra como un servicio, permite a usuarios locales obtener información sensitiva leyendo los ficheros de registro logs/instconfigifwas6.log. • http://www-1.ibm.com/support/docview.wss?uid=swg1PK67405 http://www.securityfocus.com/bid/33849 https://exchange.xforce.ibmcloud.com/vulnerabilities/48527 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •