Vulnerability Database

With exploit

ibm / websphere_application_server

Title Severity Exploit Date Affected Version
CVE-2010-0768 Low Apr 1, 2010 == 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.2.29
== 6.0.2.23
== 6.0.2.7
== 6.0.2.33
== 6.0.2.27
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0769 Low Apr 1, 2010 == 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.0.3
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.1.2
== 6.0.2.29
== 6.0.2.23
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0770 Low Apr 1, 2010 == 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.0.3
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.1.2
== 6.0.2.29
== 6.0.2.23
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2009-1898 Medium Jun 3, 2009 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
CVE-2009-1899 High Jun 3, 2009 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
CVE-2009-1900 Medium Jun 3, 2009 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
CVE-2009-1901 High Jun 3, 2009 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
<= 6.0.2.33
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.16
== 6.0.2.7
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.8
== 6.0.2.14
== 6.0.2.31
CVE-2009-0504 Low Feb 17, 2009 <= 7.0
CVE-2008-4283 High Feb 10, 2009 == 5.0.0
== 5.1.0.5
== 5.0.2.10
== 5.1.1.14
== 5.0.2.5
== 5.0.2.1
== 5.1.1.2
== 5.0
== 5.0.2.11
== 5.1.1
== 5.1.1.6
== 5.1.0
== 5.0.1
== 5.0.2.3
== 5.0.2.15
== 5.1.1.15
== 5.1.1.3
== 5.1.1.13
== 5.0.2.12
== 5.1.1.10
== 5.0.2.8
== 5.1.1.17
== 5.1.1.7
== 5.1.0.4
== 5.0.2.16
== 5.1.0.2
== 5.1.1.18
== 5.0.2.2
== 5.1.1.1
== 5.0.2.9
== 5.0.2.6
== 5.0.2.13
== 5.1.1.12
<= 5.1.1.19
== 5.1.1.8
== 5.0.2.4
== 5.1.1.16
== 5.0.2
== 5.1.1.9
== 5.0.2.14
== 5.1.1.11
== 5.1.0.3
== 5.0.2.7
== 5.1.1.5
== 5.1.1.4
CVE-2008-5411 Medium Dec 10, 2008 <= 7.0