Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm websphere extreme scale 8.6 vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv3
CVE-2015-7418
IBM WebSphere eXtreme Scale and the WebSphere DataPower XC10 Appliance allow some sensitive data to linger in memory instead of being overwritten which could allow a local user with administrator privileges to obtain sensitive information.
Ibm Websphere Extreme Scale 7.1.0
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 8.5
Ibm Websphere Extreme Scale 8.6
3.7
CVSSv3
CVE-2016-2861
IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3, 7.1.1 prior to 7.1.1.1, 8.5 prior to 8.5.0.3, and 8.6 prior to 8.6.0.8 does not properly encrypt data, which makes it easier for remote malicious users to obtain sensitive information by sniffing the network.
Ibm Websphere Extreme Scale 8.6.0.4
Ibm Websphere Extreme Scale 8.6.0.2
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 8.6.0.7
Ibm Websphere Extreme Scale 8.6.0.6
Ibm Websphere Extreme Scale 8.6.0.0
Ibm Websphere Extreme Scale 8.6.0
Ibm Websphere Extreme Scale 8.5.0.2
Ibm Websphere Extreme Scale 8.5.0.1
Ibm Websphere Extreme Scale 8.6.0.5
Ibm Websphere Extreme Scale 8.6.0.3
Ibm Websphere Extreme Scale 8.6.0.1
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 7.1.0
6.1
CVSSv3
CVE-2016-0400
CRLF injection vulnerability in IBM WebSphere eXtreme Scale 7.1.0 prior to 7.1.0.3, 7.1.1 prior to 7.1.1.1, 8.5 prior to 8.5.0.3, and 8.6 prior to 8.6.0.8 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
Ibm Websphere Extreme Scale 8.6.0.2
Ibm Websphere Extreme Scale 8.6.0.1
Ibm Websphere Extreme Scale 7.1.0.2
Ibm Websphere Extreme Scale 8.6.0.7
Ibm Websphere Extreme Scale 8.6.0.0
Ibm Websphere Extreme Scale 8.5.0
Ibm Websphere Extreme Scale 8.6.0.6
Ibm Websphere Extreme Scale 8.6.0.5
Ibm Websphere Extreme Scale 8.5.0.2
Ibm Websphere Extreme Scale 8.5.0.1
Ibm Websphere Extreme Scale 8.6.0.4
Ibm Websphere Extreme Scale 8.6.0.3
Ibm Websphere Extreme Scale 7.1.1
Ibm Websphere Extreme Scale 7.1.0
1 EDB exploit
NA
CVE-2015-4936
Unspecified vulnerability in IBM WebSphere eXtreme Scale 8.6 up to and including 8.6.0.8 allows remote malicious users to cause a denial of service via unknown vectors.
Ibm Websphere Extreme Scale 8.6.0.0
Ibm Websphere Extreme Scale 8.6.0.1
Ibm Websphere Extreme Scale 8.6.0.2
Ibm Websphere Extreme Scale 8.6.0.7
Ibm Websphere Extreme Scale 8.6.0.8
Ibm Websphere Extreme Scale 8.6.0.4
Ibm Websphere Extreme Scale 8.6.0.6
Ibm Websphere Extreme Scale 8.6.0.3
Ibm Websphere Extreme Scale 8.6.0.5
3.3
CVSSv3
CVE-2019-4112
IBM WebSphere eXtreme Scale 8.6 Admin Console allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 158105.
Ibm Websphere Extreme Scale
4.8
CVSSv3
CVE-2019-4106
IBM WebSphere eXtreme Scale 8.6 Admin Console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. I...
Ibm Websphere Extreme Scale
5.4
CVSSv3
CVE-2019-4115
IBM WebSphere eXtreme Scale 8.6 Admin API is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X...
Ibm Websphere Extreme Scale
6.1
CVSSv3
CVE-2019-4109
IBM WebSphere eXtreme Scale 8.6 Admin Console could allow a remote malicious user to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and po...
Ibm Websphere Extreme Scale
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started