Rapid7 VulnDB

IBM WebSphere Application Server: CVE-2016-0448: IBM Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server January 2016 CPU (CVE-2016-0475, CVE-2016-0466, CVE-2015-7575, CVE-2016-0448)

Back to Search

IBM WebSphere Application Server: CVE-2016-0448: IBM Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server January 2016 CPU (CVE-2016-0475, CVE-2016-0466, CVE-2015-7575, CVE-2016-0448)

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
01/20/2016
Created
07/25/2018
Added
04/27/2018
Modified
04/27/2018

Description

Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.

Solution(s)

  • ibm-was-install-7-0-0-0-pi55781
  • ibm-was-install-8-0-0-0-pi55780
  • ibm-was-install-8-5-0-0-pi55773-liberty
  • ibm-was-install-8-5-0-0-pi55774-liberty
  • ibm-was-install-8-5-0-0-pi55775
  • ibm-was-install-8-5-0-0-pi55775-liberty
  • ibm-was-install-8-5-0-0-pi55776
  • ibm-was-install-8-5-0-0-pi55776-liberty
  • ibm-was-install-8-5-0-0-pi55778
  • ibm-was-install-8-5-0-0-pi55779-liberty
  • ibm-was-upgrade-7-0-0-0-7-0-0-41
  • ibm-was-upgrade-8-0-0-0-8-0-0-13
  • ibm-was-upgrade-8-5-0-0-8-5-5-9
  • ibm-was-upgrade-8-5-0-0-8-5-5-9-liberty

References

  • ibm-was-install-7-0-0-0-pi55781
  • ibm-was-install-8-0-0-0-pi55780
  • ibm-was-install-8-5-0-0-pi55773-liberty
  • ibm-was-install-8-5-0-0-pi55774-liberty
  • ibm-was-install-8-5-0-0-pi55775
  • ibm-was-install-8-5-0-0-pi55775-liberty
  • ibm-was-install-8-5-0-0-pi55776
  • ibm-was-install-8-5-0-0-pi55776-liberty
  • ibm-was-install-8-5-0-0-pi55778
  • ibm-was-install-8-5-0-0-pi55779-liberty
  • ibm-was-upgrade-7-0-0-0-7-0-0-41
  • ibm-was-upgrade-8-0-0-0-8-0-0-13
  • ibm-was-upgrade-8-5-0-0-8-5-5-9
  • ibm-was-upgrade-8-5-0-0-8-5-5-9-liberty

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;