cve-2009-0433
Vulnerability from cvelistv5
Published
2009-02-10 22:13
Modified
2024-08-07 04:31
Severity ?
Summary
Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:31:26.271Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "PK67161",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007951"
          },
          {
            "name": "33700",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33700"
          },
          {
            "name": "websphere-server-plugin-dos(48523)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48523"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27006879"
          },
          {
            "name": "PK63499",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007033"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "PK67161",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007951"
        },
        {
          "name": "33700",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33700"
        },
        {
          "name": "websphere-server-plugin-dos(48523)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48523"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27006879"
        },
        {
          "name": "PK63499",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007033"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0433",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "PK67161",
              "refsource": "AIXAPAR",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27007951",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007951"
            },
            {
              "name": "33700",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33700"
            },
            {
              "name": "websphere-server-plugin-dos(48523)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48523"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27006879",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27006879"
            },
            {
              "name": "PK63499",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27007033",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007033"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0433",
    "datePublished": "2009-02-10T22:13:00",
    "dateReserved": "2009-02-05T00:00:00",
    "dateUpdated": "2024-08-07T04:31:26.271Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66DB2053-6DFD-4FF6-A6E9-444281531E24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80A7DAA3-2FFC-4AA3-AEB9-9ADF4A10AC39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6453897-CA51-4143-B58D-689E0B69CE34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72DB3E62-C18C-440D-B2C8-E14122D2EEFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6B95B55-7A5E-4504-B5B5-B7B03403E3A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31419896-89F7-43A2-8B7C-3B92744BBC46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDA0FE3E-2FB7-415D-BC64-4B5157EABB21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D8219D5-94D7-4E1B-BFA9-EF786FFD2C3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA0C57F6-D011-47C1-B9DC-B1C3083FD28C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F8AFDEA-237C-40CA-AFC1-ED8D212FF867\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3067F0B0-2DCD-49EB-9727-7C3C7C99A11A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F215B48-7ED5-45EB-BD26-3D3EAD01506F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C47D1C56-238B-414B-B2D2-D7069E42D001\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"625B5901-B0AF-4D00-BC56-525A6F72943D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA32E836-172D-45BF-B911-9EA2B026E76C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79307DAB-2195-4324-AA40-A4AE98D01513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:5.1.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A580AA9B-CE1A-4F21-9FAB-5DFC4FCB34E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01F45BA3-6504-47AF-B757-7B6D3526FBF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3E6D6AF-0D69-4605-B871-6DAE01CF08EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5EE7744-4584-4AE4-9F27-11EFAA002E77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DE0C501-4062-49D0-8983-5E92765C7181\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE27E903-6D65-4D29-9583-43FB4CB473B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A754DD5-585B-4E89-9C01-2B47D2F5F6F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D40DEF90-CE7F-46BB-A6FF-50C1797866B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5AAA544-D3F8-4AE2-BB2D-A64CB86EC988\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C7D4ECD-8787-4F9B-B81C-C0DFD8DD20EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C43D3515-D9F5-4DC8-A030-9F97593495F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1968803-FF03-477C-81FE-87528FC6DF6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62C1CA3B-E575-4531-A336-8BFC9F5DEC26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C130982-8C6E-413E-8296-C9C277FCBE6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E1790E4-073A-4666-80CB-4D967928A0BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6239EEAE-5852-4DF7-8627-87139BBB03B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"714C405D-1E8F-45C1-8A09-5103F0080C76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7F31FD3-8681-4F07-9644-5CC87D512520\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2604E01-E43E-4882-8896-5E646E850286\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"458BAD79-958E-4665-B1F8-0D46E0C57045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B68EE27-CC4F-4530-9DFE-D94171C45F64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC1A723F-D685-4FE5-8938-5682A2D02155\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"810E5AEC-5C35-4962-B9BB-32D66290D1D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9643B593-DADF-4F57-B41E-541C7F554A4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"521DB050-3C94-49BF-8666-6EC2C358AA27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB4AB6BD-4439-4100-A3CE-4600AED10B65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"375DF4AF-3C7C-47C3-BBB8-AF2B3827AC13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91CC2DA7-BAA6-4061-8D0C-81F002DEF06D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59BEDD70-B6DB-448F-A998-3E8774B0DB8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F200042C-D45E-4CAD-BF6E-E3DADF4D1D21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4421929D-C4B9-43C5-BE61-E68484D3B198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB622117-C91F-47D2-9832-B7DB340796E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D65E0CC-FA8C-41FD-B256-47DB0C9757FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D87691D-0719-4447-B258-5FA2BD10F11A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5827DEC-ED8A-48D9-8C27-3B49D720E7B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D0B1A00-191D-49B2-8841-FB6C48A5D0C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B9CDD56-921C-4FAF-87E2-14B91EC1A93D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95255265-6D69-46D3-9FFA-8EDB1734375C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E4191D3-64AB-482C-9DEF-DD04C4C942CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FC6EB31-9707-408B-8BF5-66BD23441A75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B73E052-AF4F-4543-AA03-F5B1FA976EA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23171B81-C991-467A-95A4-EDDAC59C37BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBD75308-7F21-4DDF-AD66-C155CF4B721B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2586C584-3258-414B-AB28-1EBA0DBD0B83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"431C250D-8279-4071-871C-1C7C4DE09B5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCA175EA-EDC6-4228-8E28-E9BBC981E60A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC300B03-7A8F-4E96-B55D-18CC258BBFCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6A4EC9D-98C2-40B0-BA40-4838FE8D1FF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3A3ADFB-93E0-42E5-B31B-59F22EA4E3EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AF5BB33-4E78-4123-8093-EBEE2F2B5598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3F4B8EA-9299-42C1-AAFB-831701ED2FA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A45B6F32-5DFF-4833-9F0F-89576724CF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13C8054A-8581-4936-AF94-291AE56EB4DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13CA9A59-DFE4-4566-8719-E6FA4720F06A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026EBFCD-0BC1-404B-BC14-292F35BE667A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A89DD1BF-4AB0-480D-9856-B1BEA73A4AAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D74F8-4321-48B3-A33E-FCCFA93013CF\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad no especificada en IBM WebSphere Aplication Server (WAS) v5.1.x anteriores a v5.1.1.19, v6.1.0.19, cuando el pluging buffering_content de Web Server est\\u00e1 activo est\\u00e1 disponible, permite a atacantes provocar una denegaci\\u00f3n de servicio (ca\\u00edda de demonio) a trav\\u00e9s de vectores no definidos, relativo a un mal manejo o fallos en la lectura del cliente, en los cuales un cliente recibe muchas respuestas error 500 de HTTP y los servidores bacjend son etiquetados como ca\\u00eddos de forma err\\u00f3nea.\\r\\n\"}]",
      "id": "CVE-2009-0433",
      "lastModified": "2024-11-21T00:59:53.660",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:N/A:P\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2009-02-10T22:30:00.437",
      "references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27006879\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27007033\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27007951\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/33700\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/48523\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27006879\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27007033\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg27007951\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/bid/33700\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/48523\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-0433\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-02-10T22:30:00.437\",\"lastModified\":\"2024-11-21T00:59:53.660\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en IBM WebSphere Aplication Server (WAS) v5.1.x anteriores a v5.1.1.19, v6.1.0.19, cuando el pluging buffering_content de Web Server est\u00e1 activo est\u00e1 disponible, permite a atacantes provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) a trav\u00e9s de vectores no definidos, relativo a un mal manejo o fallos en la lectura del cliente, en los cuales un cliente recibe muchas respuestas error 500 de HTTP y los servidores bacjend son etiquetados como ca\u00eddos de forma err\u00f3nea.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:N/A:P\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66DB2053-6DFD-4FF6-A6E9-444281531E24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A7DAA3-2FFC-4AA3-AEB9-9ADF4A10AC39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6453897-CA51-4143-B58D-689E0B69CE34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DB3E62-C18C-440D-B2C8-E14122D2EEFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B95B55-7A5E-4504-B5B5-B7B03403E3A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31419896-89F7-43A2-8B7C-3B92744BBC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA0FE3E-2FB7-415D-BC64-4B5157EABB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8219D5-94D7-4E1B-BFA9-EF786FFD2C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0C57F6-D011-47C1-B9DC-B1C3083FD28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F8AFDEA-237C-40CA-AFC1-ED8D212FF867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3067F0B0-2DCD-49EB-9727-7C3C7C99A11A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F215B48-7ED5-45EB-BD26-3D3EAD01506F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47D1C56-238B-414B-B2D2-D7069E42D001\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625B5901-B0AF-4D00-BC56-525A6F72943D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA32E836-172D-45BF-B911-9EA2B026E76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79307DAB-2195-4324-AA40-A4AE98D01513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:5.1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A580AA9B-CE1A-4F21-9FAB-5DFC4FCB34E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01F45BA3-6504-47AF-B757-7B6D3526FBF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E6D6AF-0D69-4605-B871-6DAE01CF08EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5EE7744-4584-4AE4-9F27-11EFAA002E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DE0C501-4062-49D0-8983-5E92765C7181\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE27E903-6D65-4D29-9583-43FB4CB473B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A754DD5-585B-4E89-9C01-2B47D2F5F6F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40DEF90-CE7F-46BB-A6FF-50C1797866B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5AAA544-D3F8-4AE2-BB2D-A64CB86EC988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7D4ECD-8787-4F9B-B81C-C0DFD8DD20EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C43D3515-D9F5-4DC8-A030-9F97593495F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1968803-FF03-477C-81FE-87528FC6DF6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C1CA3B-E575-4531-A336-8BFC9F5DEC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C130982-8C6E-413E-8296-C9C277FCBE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E1790E4-073A-4666-80CB-4D967928A0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6239EEAE-5852-4DF7-8627-87139BBB03B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"714C405D-1E8F-45C1-8A09-5103F0080C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F31FD3-8681-4F07-9644-5CC87D512520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2604E01-E43E-4882-8896-5E646E850286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"458BAD79-958E-4665-B1F8-0D46E0C57045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B68EE27-CC4F-4530-9DFE-D94171C45F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1A723F-D685-4FE5-8938-5682A2D02155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"810E5AEC-5C35-4962-B9BB-32D66290D1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9643B593-DADF-4F57-B41E-541C7F554A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"521DB050-3C94-49BF-8666-6EC2C358AA27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4AB6BD-4439-4100-A3CE-4600AED10B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"375DF4AF-3C7C-47C3-BBB8-AF2B3827AC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91CC2DA7-BAA6-4061-8D0C-81F002DEF06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BEDD70-B6DB-448F-A998-3E8774B0DB8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F200042C-D45E-4CAD-BF6E-E3DADF4D1D21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4421929D-C4B9-43C5-BE61-E68484D3B198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB622117-C91F-47D2-9832-B7DB340796E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D65E0CC-FA8C-41FD-B256-47DB0C9757FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D87691D-0719-4447-B258-5FA2BD10F11A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5827DEC-ED8A-48D9-8C27-3B49D720E7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0B1A00-191D-49B2-8841-FB6C48A5D0C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B9CDD56-921C-4FAF-87E2-14B91EC1A93D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95255265-6D69-46D3-9FFA-8EDB1734375C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4191D3-64AB-482C-9DEF-DD04C4C942CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FC6EB31-9707-408B-8BF5-66BD23441A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B73E052-AF4F-4543-AA03-F5B1FA976EA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23171B81-C991-467A-95A4-EDDAC59C37BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBD75308-7F21-4DDF-AD66-C155CF4B721B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2586C584-3258-414B-AB28-1EBA0DBD0B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431C250D-8279-4071-871C-1C7C4DE09B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCA175EA-EDC6-4228-8E28-E9BBC981E60A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC300B03-7A8F-4E96-B55D-18CC258BBFCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6A4EC9D-98C2-40B0-BA40-4838FE8D1FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A3ADFB-93E0-42E5-B31B-59F22EA4E3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF5BB33-4E78-4123-8093-EBEE2F2B5598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F4B8EA-9299-42C1-AAFB-831701ED2FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A45B6F32-5DFF-4833-9F0F-89576724CF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C8054A-8581-4936-AF94-291AE56EB4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13CA9A59-DFE4-4566-8719-E6FA4720F06A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026EBFCD-0BC1-404B-BC14-292F35BE667A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89DD1BF-4AB0-480D-9856-B1BEA73A4AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D74F8-4321-48B3-A33E-FCCFA93013CF\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27006879\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27007033\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27007951\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/33700\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/48523\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PK67161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27006879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27007033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg27007951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/33700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/48523\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.