Vulnerability Database

With exploit

ibm / inotes

Title Severity Exploit Date Affected Version
CVE-2017-1325 Medium May 26, 2017 == 8.5.3.4
== 9.0.1.7
== 8.5.0.0
== 8.5.3.1
== 8.5.3.2
== 8.5.1.2
== 8.5.2.2
== 8.5.1.1
== 9.0.1.2
== 8.5.1.4
== 8.5.1.3
== 8.5.0.1
== 8.5.3.0
== 9.0.0.0
== 9.0.1.1
== 9.0.1.4
== 9.0.1.5
== 8.5.3.5
== 8.5.2.3
== 8.5.3.3
== 9.0.1.0
== 8.5.1.0
== 8.5.1.5
== 9.0.1.3
== 8.5.2.0
== 9.0.1.6
== 8.5.2.1
CVE-2016-9990 Medium Mar 31, 2017 == 8.5.3.4
== 8.5.0.0
== 8.5.3.1
== 8.5.3.2
== 8.5.1.2
== 8.5.2.2
== 8.5.1.1
== 9.0.1.2
== 8.5.1.4
== 8.5.1.3
== 8.5.0.1
== 8.5.3.0
== 9.0.0.0
== 9.0.1.1
== 9.0.1.4
== 9.0.1.5
== 8.5.3.5
== 8.5.2.3
== 8.5.3.3
== 9.0.1.0
== 8.5.1.0
== 8.5.1.5
== 9.0.1.3
== 8.5.2.0
== 9.0.1.6
== 8.5.3.6
== 8.5.2.1
CVE-2016-5883 Medium Feb 23, 2017 == 8.5.3.4
== 8.5.3.1
== 8.5.3.2
== 8.5.1.2
== 8.5.2.2
== 8.5.1.1
== 9.0.1.2
== 8.5.1.4
== 8.5.1.3
== 8.5.3.0
== 9.0.0.0
== 9.0.1.1
== 9.0.1.4
== 9.0.1.5
== 8.5.3.5
== 8.5.2.3
== 8.5.3.3
== 9.0.1.0
== 8.5.1.0
== 8.5.1.5
== 9.0.1.3
== 8.5.2.0
== 9.0.1.6
== 8.5.3.6
== 8.5.2.1
CVE-2016-5881 Medium Feb 1, 2017 == 8.5.3.4
== 8.5.3.1
== 8.5.3.2
== 8.5.1.2
== 8.5.2.2
== 8.5.1.1
== 9.0.1.2
== 8.5.1.4
== 8.5.1.3
== 8.5.3.0
== 9.0.0.0
== 9.0.1.1
== 9.0.1.4
== 9.0.1.5
== 8.5.3.5
== 8.5.2.3
== 8.5.3.3
== 9.0.1.0
== 8.5.1.0
== 8.5.1.5
== 9.0.1.3
== 8.5.2.0
== 9.0.1.6
== 8.5.3.6
== 8.5.2.1
CVE-2016-2938 Medium Feb 1, 2017 == 8.5.1.0
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.1.4
== 8.5.1.5
== 8.5.2.0
== 8.5.2.1
== 8.5.2.2
== 8.5.2.3
== 8.5.3.0
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.4
== 8.5.3.5
== 8.5.3.6
== 9.0.0.0
== 9.0.1.0
== 9.0.1.1
== 9.0.1.2
== 9.0.1.3
== 9.0.1.4
== 9.0.1.5
== 9.0.1.6
CVE-2016-2939 Medium Feb 1, 2017 == 8.5.1.0
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.1.4
== 8.5.1.5
== 8.5.2.0
== 8.5.2.1
== 8.5.2.2
== 8.5.2.3
== 8.5.3.0
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.4
== 8.5.3.5
== 8.5.3.6
== 9.0.0.0
== 9.0.1.0
== 9.0.1.1
== 9.0.1.2
== 9.0.1.3
== 9.0.1.4
== 9.0.1.5
== 9.0.1.6
CVE-2016-5880 Medium Feb 1, 2017 == 8.5.1.0
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.1.4
== 8.5.1.5
== 8.5.2.0
== 8.5.2.1
== 8.5.2.2
== 8.5.2.3
== 8.5.3.0
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.4
== 8.5.3.5
== 8.5.3.6
== 9.0.0.0
== 9.0.1.0
== 9.0.1.1
== 9.0.1.2
== 9.0.1.3
== 9.0.1.4
== 9.0.1.5
== 9.0.1.6
CVE-2016-5882 Medium Feb 1, 2017 == 8.5.1.0
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.1.4
== 8.5.1.5
== 8.5.2.0
== 8.5.2.1
== 8.5.2.2
== 8.5.2.3
== 8.5.3.0
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.4
== 8.5.3.5
== 8.5.3.6
== 9.0.0.0
== 9.0.1.0
== 9.0.1.1
== 9.0.1.2
== 9.0.1.3
== 9.0.1.4
== 9.0.1.5
== 9.0.1.6
CVE-2016-5884 Medium Feb 1, 2017 == 8.5.1.0
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.1.4
== 8.5.1.5
== 8.5.2.0
== 8.5.2.1
== 8.5.2.2
== 8.5.2.3
== 8.5.3.0
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.4
== 8.5.3.5
== 8.5.3.6
== 9.0.0.0
== 9.0.1.0
== 9.0.1.1
== 9.0.1.2
== 9.0.1.3
== 9.0.1.4
== 9.0.1.5
== 9.0.1.6
CVE-2016-6113 Medium Feb 1, 2017 == 8.5.1.0
== 8.5.1.1
== 8.5.1.2
== 8.5.1.3
== 8.5.1.4
== 8.5.1.5
== 8.5.2.0
== 8.5.2.1
== 8.5.2.2
== 8.5.2.3
== 8.5.3.0
== 8.5.3.1
== 8.5.3.2
== 8.5.3.3
== 8.5.3.4
== 8.5.3.5
== 8.5.3.6
== 9.0.0.0
== 9.0.1.0
== 9.0.1.1
== 9.0.1.2
== 9.0.1.3
== 9.0.1.4
== 9.0.1.5
== 9.0.1.6