Page 7 of 65 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 50EXPL: 0

27 Jun 2006 — Unspecified vulnerability in IBM WebSphere Application Server (WAS) before 6.0.2.11, when fileServingEnabled is true, allows remote attackers to obtain JSP source code and other sensitive information via "URIs with special characters." Una vulnerabilidad no especificada en IBM WebSphere Application Server (WAS) antes de v6.0.2.11, cuando fileServingEnabled esta puesto a TRUE, permite a atacantes remotos obtener el código fuente JSP y otra información sensible a través de una "URI con caracteres especiales." • http://secunia.com/advisories/20732 •

CVSS: 10.0EPSS: 0%CPEs: 50EXPL: 0

27 Jun 2006 — Unspecified vulnerability in IBM WebSphere Application Server before 6.0.2.11 has unknown impact and attack vectors because the "UserNameToken cache was improperly used." Vulnerabilidad sin especificar en el servidor de aplicaciones IBM WebSphere en versiones anteriores a la v6.0.2.11 tiene un impacto y vectores de ataque desconocidos debido a que "la caché UserNameToken no es usada apropiadamente". • http://secunia.com/advisories/20732 •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

19 Sep 2001 — IBM WebSphere Application Server 3.02 through 3.53 uses predictable session IDs for cookies, which allows remote attackers to gain privileges of WebSphere users via brute force guessing. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0234.html •

CVSS: 7.5EPSS: 7%CPEs: 8EXPL: 3

24 May 2001 — IBM Websphere/NetCommerce3 3.1.2 allows remote attackers to cause a denial of service by directly calling the macro.d2w macro with a long string of %0a characters. • https://www.exploit-db.com/exploits/20753 •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 3

24 Jul 2000 — IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string. • https://www.exploit-db.com/exploits/20097 •