Show filters
68 Total Results
Displaying 1-10 of 68
Sort by:
Attacker Value
Unknown
CVE-2023-35890
Disclosure Date: July 07, 2023 (last updated October 08, 2023)
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637.
0
Attacker Value
Unknown
CVE-2018-1695
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
IBM WebSphere Application Server 7.0, 8.0, and 8.5.5 installations using Form Login could allow a remote attacker to conduct spoofing attacks. IBM X-Force ID: 145769.
0
Attacker Value
Unknown
CVE-2015-0110
Disclosure Date: September 15, 2017 (last updated November 26, 2024)
IBM Business Process Manager (aka BPM) 7.5.x, 8.0.x, and 8.5.x and WebSphere Lombardi Edition (aka WLE) 7.2.x allow remote authenticated users to bypass intended access restrictions on internal service types via vectors involving the executeServiceByName URL.
0
Attacker Value
Unknown
CVE-2017-1501
Disclosure Date: August 18, 2017 (last updated November 26, 2024)
IBM WebSphere Application Server 8.0, 8.5, and 9.0 could provide weaker than expected security after using the Admin Console to update the web services security bindings settings. IBM X-Force ID: 129576.
0
Attacker Value
Unknown
CVE-2017-1137
Disclosure Date: May 10, 2017 (last updated November 26, 2024)
IBM WebSphere Application Server 8.0 and 8.5.5 could provide weaker than expected security. A remote attacker could exploit this weakness to obtain sensitive information and gain unauthorized access to the admin console. IBM X-Force ID: 121549.
0
Attacker Value
Unknown
CVE-2017-1151
Disclosure Date: March 20, 2017 (last updated November 26, 2024)
IBM WebSphere Application Server 8.0, 8.5, 8.5.5, and 9.0 using OpenID Connect (OIDC) configured with a Trust Association Interceptor (TAI) could allow a user to gain elevated privileges on the system. IBM Reference #: 1999293.
0
Attacker Value
Unknown
CVE-2017-1121
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
IBM WebSphere Application Server 7.0, 8.0, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1997743
0
Attacker Value
Unknown
CVE-2016-8919
Disclosure Date: February 01, 2017 (last updated November 25, 2024)
IBM WebSphere Application Server may be vulnerable to a denial of service, caused by allowing serialized objects from untrusted sources to run and cause the consumption of resources.
0
Attacker Value
Unknown
CVE-2016-8934
Disclosure Date: February 01, 2017 (last updated November 25, 2024)
IBM WebSphere Application Server is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
0
Attacker Value
Unknown
CVE-2016-9879
Disclosure Date: January 06, 2017 (last updated November 25, 2024)
An issue was discovered in Pivotal Spring Security before 3.2.10, 4.1.x before 4.1.4, and 4.2.x before 4.2.1. Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed. Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), ge…
0