
CVE-2006-3231
https://notcve.org/view.php?id=CVE-2006-3231
27 Jun 2006 — Unspecified vulnerability in IBM WebSphere Application Server (WAS) before 6.0.2.11, when fileServingEnabled is true, allows remote attackers to obtain JSP source code and other sensitive information via "URIs with special characters." Una vulnerabilidad no especificada en IBM WebSphere Application Server (WAS) antes de v6.0.2.11, cuando fileServingEnabled esta puesto a TRUE, permite a atacantes remotos obtener el código fuente JSP y otra información sensible a través de una "URI con caracteres especiales." • http://secunia.com/advisories/20732 •

CVE-2006-3232
https://notcve.org/view.php?id=CVE-2006-3232
27 Jun 2006 — Unspecified vulnerability in IBM WebSphere Application Server before 6.0.2.11 has unknown impact and attack vectors because the "UserNameToken cache was improperly used." Vulnerabilidad sin especificar en el servidor de aplicaciones IBM WebSphere en versiones anteriores a la v6.0.2.11 tiene un impacto y vectores de ataque desconocidos debido a que "la caché UserNameToken no es usada apropiadamente". • http://secunia.com/advisories/20732 •

CVE-2001-0962
https://notcve.org/view.php?id=CVE-2001-0962
19 Sep 2001 — IBM WebSphere Application Server 3.02 through 3.53 uses predictable session IDs for cookies, which allows remote attackers to gain privileges of WebSphere users via brute force guessing. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0234.html •

CVE-2001-0390 – IBM Websphere/Net.Commerce 3 - CGI-BIN Macro Denial of Service
https://notcve.org/view.php?id=CVE-2001-0390
24 May 2001 — IBM Websphere/NetCommerce3 3.1.2 allows remote attackers to cause a denial of service by directly calling the macro.d2w macro with a long string of %0a characters. • https://www.exploit-db.com/exploits/20753 •

CVE-2000-0652 – IBM Websphere Application Server 2.0./3.0/3.0.2.1 - Showcode
https://notcve.org/view.php?id=CVE-2000-0652
24 Jul 2000 — IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string. • https://www.exploit-db.com/exploits/20097 •