- Home
- CVEs with nessus.description==IBM WebSphere Application Server 7.0 before Fix Pack 29 appears to be running on the remote host. It is, therefore, potentially affected by the following vulnerabilities :
- The TLS protocol in the GSKIT component is vulnerable to a plaintext recovery attack. (CVE-2013-0169, PM85211)
- The WS-Security run time contains a flaw that could be triggered by a specially crafted SOAP request to execute arbitrary code. (CVE-2013-0482, PM76582)
- A denial of service vulnerability exists, caused by a buffer overflow on localOS registry when using WebSphere Identity Manager (WIM). (CVE-2013-0541, PM74909)
- An unspecified cross-site scripting vulnerability exists related to the administrative console. (CVE-2013-0542, CVE-2013-2967, PM78614, PM81846)
- A validation flaw exists relating to 'Local OS registries' that may allow a remote attacker to bypass security. (CVE-2013-0543, PM75582)
- A directory traversal vulnerability exists in the administrative console via the 'PARAMETER' parameter.
(CVE-2013-0544, PM82468)
- A flaw exists relating to OAuth that could allow a remote attacker to obtain someone else's credentials.
(CVE-2013-0597, PM85834, PM87131)
- A flaw exists relating to OpenJPA that is triggered during deserialization that may allow a remote attacker to write to the file system and potentially execute arbitrary code. (CVE-2013-1768, PM86780, PM86786, PM86788, PM86791)
- An information disclosure issue exists relating to incorrect caching by the administrative console.
(CVE-2013-2976, PM79992)
- A user-supplied input validation error exists that could allow cross-site request (CSRF) attacks to be carried out. (CVE-2013-3029, PM88746)
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top