Vulnerabilities > IBM > Websphere Application Server > 6.0.1.15

DATE CVE VULNERABILITY TITLE RISK
2009-06-03 CVE-2009-1898 Information Exposure vulnerability in IBM Websphere Application Server
The secure login page in the Administrative Console component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 does not redirect to an https page upon receiving an http request, which makes it easier for remote attackers to read the contents of WAS sessions by sniffing the network.
network
low complexity
ibm CWE-200
5.0
2009-02-17 CVE-2009-0504 Information Exposure vulnerability in IBM Websphere Application Server
WSPolicy in the Web Services component in IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.1 does not properly recognize the IDAssertion.isUsed binding property, which allows local users to discover a password by reading a SOAP message.
local
low complexity
ibm CWE-200
2.1
2009-02-10 CVE-2009-0436 Permissions, Privileges, and Access Controls vulnerability in IBM Websphere Application Server
The (1) mod_ibm_ssl and (2) mod_cgid modules in IBM HTTP Server 6.0.x before 6.0.2.31 and 6.1.x before 6.1.0.19, as used in WebSphere Application Server (WAS), set incorrect permissions for AF_UNIX sockets, which has unknown impact and local attack vectors.
local
low complexity
ibm CWE-264
7.2
2009-02-10 CVE-2009-0434 Information Exposure vulnerability in IBM Websphere Application Server
PerfServlet in the PMI/Performance Tools component in IBM WebSphere Application Server (WAS) 6.0.x before 6.0.2.31, 6.1.x before 6.1.0.21, and 7.0.x before 7.0.0.1, when Performance Monitoring Infrastructure (PMI) is enabled, allows local users to obtain sensitive information by reading the (1) systemout.log and (2) ffdc files.
local
ibm CWE-200
1.9
2009-02-10 CVE-2009-0433 Multiple vulnerability in IBM WebSphere Application Server
Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down.
network
high complexity
ibm
2.6
2009-02-10 CVE-2008-4284 Link Following vulnerability in IBM Websphere Application Server
Open redirect vulnerability in the ibm_security_logout servlet in IBM WebSphere Application Server (WAS) 5.1.1.19 and earlier 5.x versions, 6.0.x before 6.0.2.33, and 6.1.x before 6.1.0.23 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the logoutExitPage feature.
network
ibm CWE-59
5.8
2008-12-10 CVE-2008-5413 Information Exposure vulnerability in IBM Websphere Application Server
PerfServlet in the PMI/Performance Tools component in IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 allows attackers to obtain sensitive information by reading the (1) systemout.log and (2) ffdc files.
network
low complexity
ibm CWE-200
5.0
2008-12-10 CVE-2008-5412 Multiple Unspecified vulnerability in IBM WebSphere Application Server
Unspecified vulnerability in IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 on Windows has unknown impact and attack vectors related to JSPs.
network
low complexity
microsoft ibm
critical
10.0
2008-12-10 CVE-2008-5411 Cryptographic Issues vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 sends SSL traffic over "unsecured TCP," which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
network
low complexity
ibm CWE-310
5.0
2008-10-22 CVE-2008-4679 Improper Authentication vulnerability in IBM Websphere Application Server
The Web Services Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.31 and 6.1 before 6.1.0.19, when Certificate Store Collections is configured to use Certificate Revocation Lists (CRL), does not call the setRevocationEnabled method on the PKIXBuilderParameters object, which prevents the "Java security method" from checking the revocation status of X.509 certificates and allows remote attackers to bypass intended access restrictions via a SOAP message with a revoked certificate.
network
ibm CWE-287
6.8