CVE-2013-0532

Cross-site request forgery (CSRF) vulnerability in IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 allows remote attackers to hijack the authentication of arbitrary users for requests that cause a denial of service via malformed HTTP data.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:security_appscan:5.6.0.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.5.0.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.6.0.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.0.0.2:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.0.1.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.0.1.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.0.11:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.0.0.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.0.0.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.6.0.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:ibm:security_appscan:8.6.0.2:-:enterprise:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:ibm:rational_policy_tester:8.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:5.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_policy_tester:8.0.0.1:*:*:*:*:*:*:*

Information

Published : 2013-03-29 09:09

Updated : 2017-08-28 18:33


NVD link : CVE-2013-0532

Mitre link : CVE-2013-0532


JSON object : View

CWE
CWE-352

Cross-Site Request Forgery (CSRF)

Advertisement

dedicated server usa

Products Affected

ibm

  • rational_policy_tester
  • security_appscan