The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of IBM WebSphere Application Server Traditional

WebSphere AS: privilege escalation via UNC Paths
An attacker can bypass restrictions via UNC Paths of WebSphere AS, in order to escalate his privileges...
6255074, 6260987, CERTFR-2020-AVI-481, CVE-2020-4534, VIGILANCE-VUL-32978
WebSphere AS: code execution via SOAP Serialized Objects
An attacker can use a vulnerability via SOAP Serialized Objects of WebSphere AS, in order to run code...
6250059, 6260987, CVE-2020-4464, VIGILANCE-VUL-32865
Apache XML Graphics Batik: information disclosure via SSRF
An attacker can bypass access restrictions to data via SSRF of Apache XML Graphics Batik, in order to obtain sensitive information...
6322683, 6327363, 6344075, CERTFR-2020-AVI-531, CVE-2019-17566, FEDORA-2020-cf8ef2f333, openSUSE-SU-2020:0851-1, openSUSE-SU-2020:1043-1, SUSE-SU-2020:1800-1, VIGILANCE-VUL-32600
WebSphere AS: information disclosure via Serialized Objects
An attacker can bypass access restrictions to data via Serialized Objects of WebSphere AS, in order to obtain sensitive information...
6220296, 6237048, CERTFR-2020-AVI-343, CVE-2020-4449, VIGILANCE-VUL-32448, ZDI-20-690
IBM WebSphere Application Server Traditional: Server Side Request Forgery
An attacker can trigger a Server Side Request Forgery of IBM WebSphere Application Server Traditional, in order to force the victim to perform operations...
6209099, 6217818, CVE-2020-4365, VIGILANCE-VUL-32268
IBM WebSphere Application Server: information disclosure
An attacker can bypass access restrictions to data of WebSphere Application Server, in order to obtain sensitive information...
6201862, 6203774, 6208019, 6255994, CVE-2020-4329, VIGILANCE-VUL-32110
WebSphere AS: privilege escalation via SOAP Connector Token-based Authentication
An attacker can bypass restrictions via SOAP Connector Token-based Authentication of WebSphere AS, in order to escalate his privileges...
6118222, 6124509, CERTFR-2020-AVI-172, CVE-2020-4276, VIGILANCE-VUL-31882
IBM SDK: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of IBM SDK, in order to execute code...
1289194, 3260187, 5694963, 5695611, 5695629, 5695653, 5695851, 6173781, 6199287, 6199289, 6201679, 6210521, 6210522, 6257207, CVE-2019-4732, SUSE-SU-2020:0466-1, VIGILANCE-VUL-31514
WebSphere AS: information disclosure via Admin Console
An attacker can bypass access restrictions to data via Admin Console of WebSphere AS, in order to obtain sensitive information...
1289152, 2892021, 3380121, 3433641, CVE-2019-4670, VIGILANCE-VUL-31513
WebSphere AS: code execution via File Name
An attacker can use a vulnerability via File Name of WebSphere AS, in order to run code...
1288786, 2892021, 3380121, 3434301, CVE-2020-4163, VIGILANCE-VUL-31503
Our database contains other pages. You can request a free trial to read them.

Display information about IBM WebSphere Application Server Traditional: