CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
84.2%
IBM WebSphere Application Server (WAS) 6.0.x through 6.0.2.43, 6.1.x before 6.1.0.37, and 7.0.x before 7.0.0.17 on z/OS, when a Local OS user registry or Federated Repository with RACF adapter is used, allows remote attackers to obtain unspecified application access via unknown vectors.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | websphere_application_server | 6.0 | cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.0.1 | cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.0.2 | cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.0.3 | cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.1 | cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.1.1 | cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.1.2 | cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.1.3 | cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.1.5 | cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:* |
ibm | websphere_application_server | 6.0.1.7 | cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:* |
secunia.com/advisories/43965
www-01.ibm.com/support/docview.wss?uid=swg21473989
www.ibm.com/support/docview.wss?uid=swg1PM35478
www.ibm.com/support/docview.wss?uid=swg1PM35480
www.ibm.com/support/docview.wss?uid=swg1PM35545
www.ibm.com/support/docview.wss?uid=swg1PM35609
www.ibm.com/support/docview.wss?uid=swg1PM35611
www.securityfocus.com/bid/47122
www.vupen.com/english/advisories/2011/0833