Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm websphere extreme scale 7.1.0 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2013-5393
The monitoring console in IBM WebSphere eXtreme Scale 7.1.0, 7.1.1, 8.5.0, and 8.6.0 does not properly process logoff actions, which has unspecified impact and remote attack vectors.
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 8.6.0
Ibm Websphere Extreme Scale 7.1.0
436
VMScore
CVE-2013-5394
The monitoring console in IBM WebSphere eXtreme Scale 7.1.0, 7.1.1, 8.5.0, and 8.6.0 allows remote authenticated users to conduct phishing attacks via unspecified vectors.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 8.6.0
312
VMScore
CVE-2013-5390
Cross-site scripting (XSS) vulnerability in the monitoring console in IBM WebSphere eXtreme Scale 7.1.0, 7.1.1, 8.5.0, and 8.6.0 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Websphere Extreme Scale 8.6.0
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5.0
187
VMScore
CVE-2015-7418
IBM WebSphere eXtreme Scale and the WebSphere DataPower XC10 Appliance allow some sensitive data to linger in memory instead of being overwritten which could allow a local user with administrator privileges to obtain sensitive information.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5
Ibm Websphere Extreme Scale 8.6
534
VMScore
CVE-2015-2026
Cross-site request forgery (CSRF) vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
383
VMScore
CVE-2015-2028
CRLF injection vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
445
VMScore
CVE-2015-2030
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 has an improper account-lockout setting, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
383
VMScore
CVE-2015-2025
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
187
VMScore
CVE-2015-2027
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 improperly performs logout actions, which allows remote malicious users to bypass intended access restrictions by leveraging an unattended workstation.
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.0
383
VMScore
CVE-2015-2029
Session fixation vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote malicious users to hijack web sessions via a session identifier.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »