Page 72 of 405 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Java Message Service (JMS) in IBM WebSphere Application Server (WAS) before 6.1.0.7 allows attackers to cause a denial of service via unknown vectors involving the "double release [of] a bytebuffer input stream," possibly a double free vulnerability. Java Message Service (JMS) en IBM WebSphere Application Server (WAS) versiones anteriores a 6.1.0.7, permite a atacantes causar una denegación de servicio por medio de vectores desconocidos que implican la "double release [of] a bytebuffer input stream”, posiblemente una vulnerabilidad de doble liberación. • http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www.vupen.com/english/advisories/2007/1282 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in the Servlet Engine/Web Container in IBM WebSphere Application Server (WAS) before 6.1.0.7 has unknown impact and attack vectors. Vulnerabilidad no especificada en Servlet Engine/Web Container en IBM WebSphere Application Server (WAS) anterior a 6.1.0.7 tiene un impacto desconocido y vectores de ataque. • http://osvdb.org/41605 http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www-1.ibm.com/support/search.wss?rs=0&q=PK36447&apar=only http://www.vupen.com/english/advisories/2007/1282 https://exchange.xforce.ibmcloud.com/vulnerabilities/33471 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

CRLF injection vulnerability in IBM WebSphere Application Server (WAS) before 6.0.2.19 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a single CRLF sequence in a context that is not a valid multi-line header. Vulnerabilidad de inyección de retornos de carro y saltos de línea en BM WebSphere Application Server (WAS) versiones anteriores a 6.0.2.19 permite a atacantes remotos inyectar cabeceras HTML de su elección y conducir respuestas HTTP fraccionando ataques mediante una secuencia de retornos de carro y saltos de línea en un contexto que no es una cabecera válida multi-línea. • http://osvdb.org/34484 http://secunia.com/advisories/24552 http://www-1.ibm.com/support/docview.wss?uid=swg1PK39732 http://www.securityfocus.com/bid/23086 http://www.securitytracker.com/id?1017806 http://www.vupen.com/english/advisories/2007/1062 https://exchange.xforce.ibmcloud.com/vulnerabilities/33123 •

CVSS: 4.3EPSS: 1%CPEs: 6EXPL: 0

IBM WebSphere Application Server (WAS) 5.0 through 5.1.1.0 allows remote attackers to obtain JSP source code and other sensitive information via certain "special URIs." IBM WebSphere Application Server (WAS) 5.0 hasta 5.1.1.0 permite a atacantes remotos obtener el código fuente JSP y otra información sensible mediante ciertas "URIs especiales". • http://secunia.com/advisories/24478 http://www-1.ibm.com/support/docview.wss?uid=swg21243541 http://www-1.ibm.com/support/docview.wss?uid=swg24013032 http://www.securityfocus.com/bid/22991 http://www.vupen.com/english/advisories/2007/0970 •

CVSS: 5.0EPSS: 1%CPEs: 34EXPL: 0

IBM WebSphere Application Server (WAS) 5.1.1.9 and earlier allows remote attackers to obtain JSP source code and other sensitive information via "a specific JSP URL." IBM WebSphere Application Server (WAS) 5.1.1.9 y anteriores permiten a atacantes remotos obtener el código fuente JSP y otra información sensible mediante ciertas "URIs especiales". • http://secunia.com/advisories/24478 http://www-1.ibm.com/support/docview.wss?uid=swg21243541 http://www-1.ibm.com/support/docview.wss?uid=swg24011720 http://www.securityfocus.com/bid/22991 http://www.vupen.com/english/advisories/2007/0970 •