cpe:2.3:a:ibm:websphere_mq:6.0.1.0:*:*:*:*:*:*:*
Under non-standard configurations, IBM WebSphere MQ might send password data in clear text over the network. This data could be intercepted using man in the middle techniques.
Max CVSS
5.9
EPSS Score
0.12%
Published
2017-02-22
Updated
2017-07-12
IBM WebSphere MQ 8.0 could allow an authenticated user to crash the MQ channel due to improper data conversion handling. IBM Reference #: 1998661.
Max CVSS
6.5
EPSS Score
0.07%
Published
2017-02-22
Updated
2017-03-02
Cross-site scripting (XSS) vulnerability in MQ XR WebSockets Listener in WMQ Telemetry in IBM WebSphere MQ 8.0 before 8.0.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URI that is included in an error response.
Max CVSS
4.3
EPSS Score
0.10%
Published
2015-04-27
Updated
2017-02-08
IBM WebSphere MQ 6.0 before 6.0.2.11 and 7.0 before 7.0.1.5 does not use the CRL Distribution Points (CDP) certificate extension, which might allow man-in-the-middle attackers to spoof an SSL partner via a revoked certificate for a (1) client, (2) queue manager, or (3) application.
Max CVSS
4.3
EPSS Score
0.09%
Published
2011-07-07
Updated
2017-08-17
Heap-based buffer overflow in IBM WebSphere MQ 6.0 before 6.0.2.11 and 7.0 before 7.0.1.5 allows remote authenticated users to execute arbitrary code or cause a denial of service (queue manager crash) by inserting an invalid message into the queue.
Max CVSS
6.5
EPSS Score
32.94%
Published
2011-01-12
Updated
2017-08-17
IBM WebSphere MQ 6.0 before 6.0.2.9 and 7.0 before 7.0.1.1 does not encrypt the username and password in the security parameters field, which allows remote attackers to obtain sensitive information by sniffing the network traffic from a .NET client application.
Max CVSS
4.3
EPSS Score
0.23%
Published
2010-11-12
Updated
2017-08-17
IBM WebSphere MQ 6.x before 6.0.2.10 and 7.x before 7.0.1.3 allows remote attackers to spoof X.509 certificate authentication, and send or receive channel messages, via a crafted Subject Distinguished Name (DN) value in a certificate.
Max CVSS
4.3
EPSS Score
0.35%
Published
2010-10-20
Updated
2017-08-17
IBM WebSphere MQ 6.x through 6.0.2.7, 7.0.0.0, 7.0.0.1, 7.0.0.2, and 7.0.1.0, when read ahead or asynchronous message consumption is enabled, allows attackers to have an unspecified impact via unknown vectors, related to a "memory overwrite" issue.
Max CVSS
8.8
EPSS Score
0.18%
Published
2009-09-10
Updated
2009-10-01
IBM WebSphere MQ 6.0 before 6.0.2.8 and 7.0 before 7.0.1.0 does not properly handle long group names, which might allow local users to gain privileges by leveraging combinations of group names with the same initial substring.
Max CVSS
1.7
EPSS Score
0.04%
Published
2011-10-30
Updated
2017-08-17
Heap-based buffer overflow in the client in IBM WebSphere MQ 6.0 before 6.0.2.7 and 7.0 before 7.0.1.0 allows local users to gain privileges via crafted SSL information in a Client Channel Definition Table (CCDT) file.
Max CVSS
4.1
EPSS Score
0.04%
Published
2011-10-30
Updated
2017-08-17
Buffer overflow in the queue manager in IBM WebSphere MQ 6.x before 6.0.2.7 and 7.x before 7.0.1.0 allows remote attackers to execute arbitrary code via a crafted request.
Max CVSS
10.0
EPSS Score
15.88%
Published
2009-06-03
Updated
2017-08-17
Unspecified vulnerability in the queue manager in IBM WebSphere MQ (WMQ) 5.3, 6.0 before 6.0.2.6, and 7.0 before 7.0.0.2 allows local users to gain privileges via vectors related to the (1) setmqaut, (2) dmpmqaut, and (3) dspmqaut authorization commands.
Max CVSS
7.2
EPSS Score
0.04%
Published
2009-02-24
Updated
2017-08-08
The WebSphere MQ XA 5.3 before FP13 and 6.0.x before 6.0.2.1 client for Windows, when running in an MTS or a COM+ environment, grants the PROCESS_DUP_HANDLE privilege to the Everyone group upon connection to a queue manager, which allows local users to duplicate an arbitrary handle and possibly hijack an arbitrary process.
Max CVSS
3.3
EPSS Score
0.04%
Published
2008-03-09
Updated
2008-11-15
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!