CVE-2009-2747
30.10.2011, 10:55
The Java Naming and Directory Interface (JNDI) implementation in IBM WebSphere Application Server (WAS) 6.0 before 6.0.2.39, 6.1 before 6.1.0.29, and 7.0 before 7.0.0.7 does not properly restrict access to UserRegistry object methods, which allows remote attackers to obtain sensitive information via a crafted method call.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | websphere_application_server | 6.0 |
ibm | websphere_application_server | 6.0.0.1 |
ibm | websphere_application_server | 6.0.0.2 |
ibm | websphere_application_server | 6.0.0.3 |
ibm | websphere_application_server | 6.0.1 |
ibm | websphere_application_server | 6.0.1.1 |
ibm | websphere_application_server | 6.0.1.2 |
ibm | websphere_application_server | 6.0.1.3 |
ibm | websphere_application_server | 6.0.1.5 |
ibm | websphere_application_server | 6.0.1.7 |
ibm | websphere_application_server | 6.0.1.9 |
ibm | websphere_application_server | 6.0.1.11 |
ibm | websphere_application_server | 6.0.1.13 |
ibm | websphere_application_server | 6.0.1.15 |
ibm | websphere_application_server | 6.0.1.17 |
ibm | websphere_application_server | 6.0.2 |
ibm | websphere_application_server | 6.0.2.1 |
ibm | websphere_application_server | 6.0.2.2 |
ibm | websphere_application_server | 6.0.2.3 |
ibm | websphere_application_server | 6.0.2.4 |
ibm | websphere_application_server | 6.0.2.5 |
ibm | websphere_application_server | 6.0.2.6 |
ibm | websphere_application_server | 6.0.2.7 |
ibm | websphere_application_server | 6.0.2.9 |
ibm | websphere_application_server | 6.0.2.11 |
ibm | websphere_application_server | 6.0.2.13 |
ibm | websphere_application_server | 6.0.2.15 |
ibm | websphere_application_server | 6.0.2.17 |
ibm | websphere_application_server | 6.0.2.19 |
ibm | websphere_application_server | 6.0.2.22 |
ibm | websphere_application_server | 6.0.2.23 |
ibm | websphere_application_server | 6.0.2.24 |
ibm | websphere_application_server | 6.0.2.25 |
ibm | websphere_application_server | 6.0.2.27 |
ibm | websphere_application_server | 6.0.2.28 |
ibm | websphere_application_server | 6.0.2.29 |
ibm | websphere_application_server | 6.0.2.30 |
ibm | websphere_application_server | 6.0.2.31 |
ibm | websphere_application_server | 6.0.2.32 |
ibm | websphere_application_server | 6.0.2.33 |
ibm | websphere_application_server | 6.0.2.35 |
ibm | websphere_application_server | 6.0.2.37 |
ibm | websphere_application_server | 6.1.0 |
ibm | websphere_application_server | 6.1.0.0 |
ibm | websphere_application_server | 6.1.0.1 |
ibm | websphere_application_server | 6.1.0.2 |
ibm | websphere_application_server | 6.1.0.5 |
ibm | websphere_application_server | 6.1.0.7 |
ibm | websphere_application_server | 6.1.0.9 |
ibm | websphere_application_server | 6.1.0.11 |
ibm | websphere_application_server | 6.1.0.12 |
ibm | websphere_application_server | 6.1.0.15 |
ibm | websphere_application_server | 6.1.0.17 |
ibm | websphere_application_server | 6.1.0.19 |
ibm | websphere_application_server | 6.1.0.21 |
ibm | websphere_application_server | 6.1.0.23 |
ibm | websphere_application_server | 6.1.0.25 |
ibm | websphere_application_server | 6.1.0.27 |
ibm | websphere_application_server | 7.0 |
ibm | websphere_application_server | 7.0.0.1 |
ibm | websphere_application_server | 7.0.0.2 |
ibm | websphere_application_server | 7.0.0.3 |
ibm | websphere_application_server | 7.0.0.4 |
ibm | websphere_application_server | 7.0.0.5 |
ibm | websphere_application_server | 7.0.0.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References