Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm websphere extreme scale 7.1.0.2 vulnerabilities and exploits
(subscribe to this query)
6
CVSSv2
CVE-2015-2026
Cross-site request forgery (CSRF) vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
5
CVSSv2
CVE-2015-2030
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 has an improper account-lockout setting, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
4.3
CVSSv2
CVE-2016-2861
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3, 7.1.1 prior to 7.1.1.1, 8.5 prior to 8.5.0.3, and 8.6 prior to 8.6.0.8 does not properly encrypt data, which makes it easier for remote malicious users to obtain sensitive information by sniffing the network.
Ibm Websphere Extreme Scale 8.6.0.4
Ibm Websphere Extreme Scale 8.6.0.2
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 8.6.0.7
Ibm Websphere Extreme Scale 8.6.0.6
Ibm Websphere Extreme Scale 8.6.0.0
Ibm Websphere Extreme Scale 8.6.0
Ibm Websphere Extreme Scale 8.5.0.2
Ibm Websphere Extreme Scale 8.5.0.1
Ibm Websphere Extreme Scale 8.6.0.5
Ibm Websphere Extreme Scale 8.6.0.3
Ibm Websphere Extreme Scale 8.6.0.1
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 7.1.0
4.3
CVSSv2
CVE-2016-0400
CRLF injection vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3, 7.1.1 prior to 7.1.1.1, 8.5 prior to 8.5.0.3, and 8.6 prior to 8.6.0.8 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
Ibm Websphere Extreme Scale 8.6.0.2
Ibm Websphere Extreme Scale 8.6.0.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 8.6.0.7
Ibm Websphere Extreme Scale 8.6.0.0
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 8.6.0.6
Ibm Websphere Extreme Scale 8.6.0.5
Ibm Websphere Extreme Scale 8.5.0.2
Ibm Websphere Extreme Scale 8.5.0.1
Ibm Websphere Extreme Scale 8.6.0.4
Ibm Websphere Extreme Scale 8.6.0.3
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0
1 EDB exploit
4.3
CVSSv2
CVE-2015-2025
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
4.3
CVSSv2
CVE-2015-2028
CRLF injection vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
4.3
CVSSv2
CVE-2015-2029
Session fixation vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote malicious users to hijack web sessions via a session identifier.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.1
3.5
CVSSv2
CVE-2015-2031
Cross-site scripting (XSS) vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
3.5
CVSSv2
CVE-2013-6734
IBM WebSphere eXtreme Scale Client 7.1 up to and including 8.6.0.4 does not properly isolate the cached data of different users, which allows remote authenticated users to obtain sensitive information in opportunistic circumstances by leveraging access to the same web container.
Ibm Websphere Extreme Scale Client
Ibm Websphere Extreme Scale Client 8.6.0.3
Ibm Websphere Extreme Scale Client 8.5.0.0
Ibm Websphere Extreme Scale Client 7.1.1.1
Ibm Websphere Extreme Scale Client 8.6.0.2
Ibm Websphere Extreme Scale Client 8.6.0.1
Ibm Websphere Extreme Scale Client 7.1.1.0
Ibm Websphere Extreme Scale Client 7.1.0.3
Ibm Websphere Extreme Scale Client 8.6.0.0
Ibm Websphere Extreme Scale Client 8.5.0.3
Ibm Websphere Extreme Scale Client 7.1.0.2
Ibm Websphere Extreme Scale Client 7.1.0.0
Ibm Websphere Extreme Scale Client 8.5.0.2
Ibm Websphere Extreme Scale Client 8.5.0.1
Ibm Websphere Extreme Scale Client 7.0.0.0
2.1
CVSSv2
CVE-2015-2027
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3 and 7.1.1 prior to 7.1.1.1 improperly performs logout actions, which allows remote malicious users to bypass intended access restrictions by leveraging an unattended workstation.
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 7.1.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started