CVE-2012-0193
20.01.2012, 04:04
IBM WebSphere Application Server (WAS) 6.0 through 6.0.2.43, 6.1 before 6.1.0.43, 7.0 before 7.0.0.23, and 8.0 before 8.0.0.3 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | websphere_application_server | 6.0.0.0 |
ibm | websphere_application_server | 6.0.0.2 |
ibm | websphere_application_server | 6.0.0.3 |
ibm | websphere_application_server | 6.0.1.0 |
ibm | websphere_application_server | 6.0.1.11 |
ibm | websphere_application_server | 6.0.1.12 |
ibm | websphere_application_server | 6.0.2.0 |
ibm | websphere_application_server | 6.0.2.1 |
ibm | websphere_application_server | 6.0.2.2 |
ibm | websphere_application_server | 6.0.2.3 |
ibm | websphere_application_server | 6.0.2.4 |
ibm | websphere_application_server | 6.0.2.5 |
ibm | websphere_application_server | 6.0.2.6 |
ibm | websphere_application_server | 6.0.2.7 |
ibm | websphere_application_server | 6.0.2.8 |
ibm | websphere_application_server | 6.0.2.9 |
ibm | websphere_application_server | 6.0.2.11 |
ibm | websphere_application_server | 6.0.2.13 |
ibm | websphere_application_server | 6.0.2.15 |
ibm | websphere_application_server | 6.0.2.17 |
ibm | websphere_application_server | 6.0.2.19 |
ibm | websphere_application_server | 6.0.2.21 |
ibm | websphere_application_server | 6.0.2.23 |
ibm | websphere_application_server | 6.0.2.25 |
ibm | websphere_application_server | 6.0.2.27 |
ibm | websphere_application_server | 6.0.2.29 |
ibm | websphere_application_server | 6.0.2.31 |
ibm | websphere_application_server | 6.0.2.33 |
ibm | websphere_application_server | 6.0.2.35 |
ibm | websphere_application_server | 6.0.2.37 |
ibm | websphere_application_server | 6.0.2.43 |
ibm | websphere_application_server | 6.1.0.0 |
ibm | websphere_application_server | 6.1.0.1 |
ibm | websphere_application_server | 6.1.0.3 |
ibm | websphere_application_server | 6.1.0.5 |
ibm | websphere_application_server | 6.1.0.7 |
ibm | websphere_application_server | 6.1.0.9 |
ibm | websphere_application_server | 6.1.0.11 |
ibm | websphere_application_server | 6.1.0.13 |
ibm | websphere_application_server | 6.1.0.14 |
ibm | websphere_application_server | 6.1.0.15 |
ibm | websphere_application_server | 6.1.0.17 |
ibm | websphere_application_server | 6.1.0.19 |
ibm | websphere_application_server | 6.1.0.21 |
ibm | websphere_application_server | 6.1.0.23 |
ibm | websphere_application_server | 6.1.0.25 |
ibm | websphere_application_server | 6.1.0.27 |
ibm | websphere_application_server | 6.1.0.33 |
ibm | websphere_application_server | 6.1.0.35 |
ibm | websphere_application_server | 6.1.0.37 |
ibm | websphere_application_server | 6.1.0.39 |
ibm | websphere_application_server | 6.1.0.41 |
ibm | websphere_application_server | 7.0.0.1 |
ibm | websphere_application_server | 7.0.0.2 |
ibm | websphere_application_server | 7.0.0.3 |
ibm | websphere_application_server | 7.0.0.5 |
ibm | websphere_application_server | 7.0.0.7 |
ibm | websphere_application_server | 7.0.0.9 |
ibm | websphere_application_server | 7.0.0.11 |
ibm | websphere_application_server | 7.0.0.13 |
ibm | websphere_application_server | 7.0.0.15 |
ibm | websphere_application_server | 7.0.0.17 |
ibm | websphere_application_server | 7.0.0.19 |
ibm | websphere_application_server | 7.0.0.21 |
ibm | websphere_application_server | 8.0.0.0 |
ibm | websphere_application_server | 8.0.0.1 |
ibm | websphere_application_server | 8.0.0.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References