Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm websphere extreme scale 7.1.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2013-5393
The monitoring console in IBM WebSphere eXtreme Scale 7.1.0, 7.1.1, 8.5.0, and 8.6.0 does not properly process logoff actions, which has unspecified impact and remote attack vectors.
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 8.6.0
Ibm Websphere Extreme Scale 7.1.0
3.5
CVSSv2
CVE-2013-5390
Cross-site scripting (XSS) vulnerability in the monitoring console in IBM WebSphere eXtreme Scale 7.1.0, 7.1.1, 8.5.0, and 8.6.0 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Websphere Extreme Scale 8.6.0
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5.0
4.9
CVSSv2
CVE-2013-5394
The monitoring console in IBM WebSphere eXtreme Scale 7.1.0, 7.1.1, 8.5.0, and 8.6.0 allows remote authenticated users to conduct phishing attacks via unspecified vectors.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 8.6.0
2.1
CVSSv2
CVE-2015-7418
IBM WebSphere eXtreme Scale and the WebSphere DataPower XC10 Appliance allow some sensitive data to linger in memory instead of being overwritten which could allow a local user with administrator privileges to obtain sensitive information.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5
Ibm Websphere Extreme Scale 8.6
4.3
CVSSv2
CVE-2015-2025
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
2.1
CVSSv2
CVE-2015-2027
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 improperly performs logout actions, which allows remote malicious users to bypass intended access restrictions by leveraging an unattended workstation.
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.0
4.3
CVSSv2
CVE-2015-2029
Session fixation vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote malicious users to hijack web sessions via a session identifier.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
6
CVSSv2
CVE-2015-2026
Cross-site request forgery (CSRF) vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
3.5
CVSSv2
CVE-2015-2031
Cross-site scripting (XSS) vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
4.3
CVSSv2
CVE-2015-2028
CRLF injection vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »