CVE-2014-6136CVE-2014-6136

Affected configuration(s):

cpe:/a:ibm:security_appscan:8.0.0.0::~~standard~~~
cpe:/a:ibm:security_appscan:8.0.0.1::~~standard~~~
cpe:/a:ibm:security_appscan:8.0.0.2::~~standard~~~
cpe:/a:ibm:security_appscan:8.0.0.3::~~standard~~~
cpe:/a:ibm:security_appscan:8.5.0.0::~~standard~~~
cpe:/a:ibm:security_appscan:8.5.0.1::~~standard~~~
cpe:/a:ibm:security_appscan:8.6.0.0::~~standard~~~
cpe:/a:ibm:security_appscan:8.6.0.1::~~standard~~~
cpe:/a:ibm:security_appscan:8.7.0.0::~~standard~~~
cpe:/a:ibm:security_appscan:8.7.0.1::~~standard~~~
cpe:/a:ibm:security_appscan:8.8.0.0::~~standard~~~
cpe:/a:ibm:security_appscan:9.0.0.0::~~standard~~~
cpe:/a:ibm:security_appscan:9.0.0.1::~~standard~~~
cpe:/a:ibm:security_appscan:9.0.1.0::~~standard~~~
cpe:/a:ibm:security_appscan:9.0.1.1::~~standard~~~

Date published: 2015-02-01T20:59:00.047-05:00

Date last modified: 2017-09-07T21:29:09.747-04:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21695170

Summary: IBM Security AppScan Standard 8.x and 9.x before 9.0.1.1 FP1 supports unencrypted sessions, which allows remote attackers to obtain sensitive information by sniffing the network.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.