5
CVE-2014-3021
- EPSS 0.29%
- Veröffentlicht 19.10.2014 01:55:12
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle psirt@us.ibm.com
- Teams Watchlist Login
- Unerledigt Login
IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.35, 8.0 before 8.0.0.10, and 8.5 before 8.5.5.4 does not properly handle HTTP headers, which allows remote attackers to obtain sensitive cookie and authentication data via an unspecified HTTP method.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Websphere Application Server Version7.0
Ibm ≫ Websphere Application Server Version7.0.0.1
Ibm ≫ Websphere Application Server Version7.0.0.2
Ibm ≫ Websphere Application Server Version7.0.0.3
Ibm ≫ Websphere Application Server Version7.0.0.4
Ibm ≫ Websphere Application Server Version7.0.0.5
Ibm ≫ Websphere Application Server Version7.0.0.6
Ibm ≫ Websphere Application Server Version7.0.0.7
Ibm ≫ Websphere Application Server Version7.0.0.8
Ibm ≫ Websphere Application Server Version7.0.0.9
Ibm ≫ Websphere Application Server Version7.0.0.10
Ibm ≫ Websphere Application Server Version7.0.0.11
Ibm ≫ Websphere Application Server Version7.0.0.12
Ibm ≫ Websphere Application Server Version7.0.0.13
Ibm ≫ Websphere Application Server Version7.0.0.14
Ibm ≫ Websphere Application Server Version7.0.0.15
Ibm ≫ Websphere Application Server Version7.0.0.16
Ibm ≫ Websphere Application Server Version7.0.0.17
Ibm ≫ Websphere Application Server Version7.0.0.18
Ibm ≫ Websphere Application Server Version7.0.0.19
Ibm ≫ Websphere Application Server Version7.0.0.21
Ibm ≫ Websphere Application Server Version7.0.0.22
Ibm ≫ Websphere Application Server Version7.0.0.23
Ibm ≫ Websphere Application Server Version7.0.0.24
Ibm ≫ Websphere Application Server Version7.0.0.25
Ibm ≫ Websphere Application Server Version7.0.0.27
Ibm ≫ Websphere Application Server Version7.0.0.28
Ibm ≫ Websphere Application Server Version7.0.0.29
Ibm ≫ Websphere Application Server Version7.0.0.31
Ibm ≫ Websphere Application Server Version7.0.0.32
Ibm ≫ Websphere Application Server Version7.0.0.33
Ibm ≫ Websphere Application Server Version7.0.0.34
Ibm ≫ Websphere Application Server Version8.0
Ibm ≫ Websphere Application Server Version8.0.0.0
Ibm ≫ Websphere Application Server Version8.0.0.1
Ibm ≫ Websphere Application Server Version8.0.0.2
Ibm ≫ Websphere Application Server Version8.0.0.3
Ibm ≫ Websphere Application Server Version8.0.0.4
Ibm ≫ Websphere Application Server Version8.0.0.5
Ibm ≫ Websphere Application Server Version8.0.0.6
Ibm ≫ Websphere Application Server Version8.0.0.7
Ibm ≫ Websphere Application Server Version8.0.0.8
Ibm ≫ Websphere Application Server Version8.0.0.9
Ibm ≫ Websphere Application Server Version8.5.0.0
Ibm ≫ Websphere Application Server Version8.5.0.0 Update- Editionliberty_profile
Ibm ≫ Websphere Application Server Version8.5.0.1
Ibm ≫ Websphere Application Server Version8.5.0.1 Update- Editionliberty_profile
Ibm ≫ Websphere Application Server Version8.5.0.2
Ibm ≫ Websphere Application Server Version8.5.0.2 Update- Editionliberty_profile
Ibm ≫ Websphere Application Server Version8.5.5.0
Ibm ≫ Websphere Application Server Version8.5.5.0 Update- Editionliberty_profile
Ibm ≫ Websphere Application Server Version8.5.5.1
Ibm ≫ Websphere Application Server Version8.5.5.1 Update- Editionliberty_profile
Ibm ≫ Websphere Application Server Version8.5.5.2
Ibm ≫ Websphere Application Server Version8.5.5.2 Update- Editionliberty_profile
Ibm ≫ Websphere Application Server Version8.5.5.3
Ibm ≫ Websphere Application Server Version8.5.5.3 Update- SwEditionliberty_profile
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.29% | 0.523 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.