Total vulnerabilities in the database
The log viewer in IBM Workload Deployer 3.1 before 3.1.0.7 allows remote attackers to obtain sensitive information via a direct request for the URL of a log document.
Software | From | Fixed in |
---|---|---|
ibm / workload_deployer | 3.1.0.6 | 3.1.0.6.x |
ibm / workload_deployer | 3.1.0.2 | 3.1.0.2.x |
ibm / workload_deployer | 3.1.0 | 3.1.0.x |
ibm / workload_deployer | 3.1.0.1 | 3.1.0.1.x |