Vulnerability Database

With exploit

ibm / websphere_application_server

Title Severity Exploit Date Affected Version
CVE-2010-2328 Medium Jun 18, 2010 == 7.0.0.5
== 7.0.0.9
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0774 Low May 18, 2010 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.0.3
== 6.0.1.15
== 6.0.1.3
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.1.11
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
== 6.0.2.35
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.1.9
== 6.0.1.17
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.1.2
== 6.0.0.1
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.39
== 6.0.2.16
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.1.5
== 6.0.1.7
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.1.1
== 6.0.2.25
== 6.0.2.37
== 6.0.2.8
== 6.0.2.14
== 6.0.1.13
== 6.0.2.31
== 6.1.0.21
== 6.1
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.0
== 6.1.0.1
== 6.1.0.27
== 6.1.0.29
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0.0.9
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0775 Medium May 18, 2010 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.0.3
== 6.0.1.15
== 6.0.1.3
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.1.11
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
== 6.0.2.35
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.1.9
== 6.0.1.17
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.1.2
== 6.0.0.1
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.39
== 6.0.2.16
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.1.5
== 6.0.1.7
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.1.1
== 6.0.2.25
== 6.0.2.37
== 6.0.2.8
== 6.0.2.14
== 6.0.1.13
== 6.0.2.31
== 6.1.0.21
== 6.1
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.0
== 6.1.0.1
== 6.1.0.27
== 6.1.0.29
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0.0.9
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0776 Medium May 18, 2010 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.0.3
== 6.0.1.15
== 6.0.1.3
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.1.11
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
== 6.0.2.35
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.1.9
== 6.0.1.17
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.1.2
== 6.0.0.1
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.39
== 6.0.2.16
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.1.5
== 6.0.1.7
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.1.1
== 6.0.2.25
== 6.0.2.37
== 6.0.2.8
== 6.0.2.14
== 6.0.1.13
== 6.0.2.31
== 6.1.0.21
== 6.1
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.0
== 6.1.0.1
== 6.1.0.27
== 6.1.0.29
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0.0.9
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0777 Low May 18, 2010 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.0.3
== 6.0.1.15
== 6.0.1.3
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.1.11
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
== 6.0.2.35
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.1.9
== 6.0.1.17
== 6.0.2.15
== 6.0.2.4
== 6.0.2.32
== 6.0.2.17
== 6.0.1.2
== 6.0.0.1
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.39
== 6.0.2.16
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.1.5
== 6.0.1.7
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.1.1
== 6.0.2.25
== 6.0.2.37
== 6.0.2.8
== 6.0.2.14
== 6.0.1.13
== 6.0.2.31
== 6.1.0.21
== 6.1
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.0
== 6.1.0.1
== 6.1.0.27
== 6.1.0.29
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0.0.9
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-1650 Low May 3, 2010 == 6.0.2.10
== 6.0.2.1
== 6.0.2.5
== 6.0.0.3
== 6.0.1.15
== 6.0.1.3
== 6.0.2.20
== 6.0.2.13
== 6.0.2.9
== 6.0.1.11
== 6.0.2.28
== 6.0.2.11
== 6.0.2.6
== 6.0.2.2
== 6.0.2.35
== 6.0.2
== 6.0.2.24
== 6.0.2.21
== 6.0.1.9
== 6.0.1.17
== 6.0.2.15
== 6.0.2.4
== 6.0.2.17
== 6.0.1.2
== 6.0.0.1
== 6.0.2.30
== 6.0.2.29
== 6.0.2.23
== 6.0.2.18
== 6.0.2.39
== 6.0.2.16
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0.2.12
== 6.0.2.22
== 6.0.1.5
== 6.0.1.7
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.1.1
== 6.0.2.25
== 6.0.2.37
== 6.0.2.8
== 6.0.2.14
== 6.0.1.13
== 6.0.2.31
== 6.1.0.21
== 6.1.7
== 6.1
== 6.1.0.22
== 6.1.0.19
== 6.1.6
== 6.1.0.2
== 6.1.0.4
== 6.1.0.25
== 6.1.14
== 6.1.0.11
== 6.1.0.14
== 6.1.0.20
== 6.1.0.9
== 6.1.0.24
== 6.1.0.0
== 6.1.0.1
== 6.1.5
== 6.1.0.27
== 6.1.0.29
== 6.1.13
== 6.1.0.7
== 6.1.1
== 6.1.0.3
== 6.1.0.17
== 6.1.0.26
== 6.1.0.13
== 6.1.0.16
== 6.1.0.6
== 6.1.0.10
== 6.1.0.8
== 6.1.0.15
== 6.1.0.18
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 6.1.0.12
== 6.1.3
== 7.0.0.5
== 7.0.0.9
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-1651 Low May 3, 2010 == 6.1
== 6.1.0
== 6.1.0.0
== 6.1.0.1
== 6.1.0.2
== 6.1.0.3
== 6.1.0.4
== 6.1.0.5
== 6.1.0.6
== 6.1.0.7
== 6.1.0.8
== 6.1.0.9
== 6.1.0.10
== 6.1.0.11
== 6.1.0.12
== 6.1.0.13
== 6.1.0.14
== 6.1.0.15
== 6.1.0.16
== 6.1.0.17
== 6.1.0.18
== 6.1.0.19
== 6.1.0.20
== 6.1.0.21
== 6.1.0.22
== 6.1.0.23
== 6.1.0.24
== 6.1.0.25
== 6.1.0.26
== 6.1.0.27
== 6.1.0.29
== 6.1.1
== 6.1.3
== 6.1.5
== 6.1.6
== 6.1.7
== 6.1.13
== 6.1.14
== 7.0
== 7.0.0.1
== 7.0.0.3
== 7.0.0.5
== 7.0.0.7
== 7.0.0.9
CVE-2010-0768 Low Apr 1, 2010 == 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.2.29
== 6.0.2.23
== 6.0.2.7
== 6.0.2.33
== 6.0.2.27
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0769 Low Apr 1, 2010 == 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.0.3
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.1.2
== 6.0.2.29
== 6.0.2.23
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1
CVE-2010-0770 Low Apr 1, 2010 == 6.0.2.1
== 6.0.2.5
<= 6.0.2.39
== 6.0.0.3
== 6.0.2.13
== 6.0.2.9
== 6.0.2.11
== 6.0.2.35
== 6.0.2
== 6.0.2.21
== 6.0.2.15
== 6.0.2.17
== 6.0.1.2
== 6.0.2.29
== 6.0.2.23
== 6.0.1
== 6.0.2.7
== 6.0.0.2
== 6.0.2.33
== 6.0.2.27
== 6.0
== 6.0.2.3
== 6.0.2.19
== 6.0.2.25
== 6.0.2.37
== 6.0.2.31
== 6.1.0.21
== 6.1.0.19
== 6.1.0.2
== 6.1.0.25
== 6.1.0.11
== 6.1.0.9
== 6.1.0.1
== 6.1.0.27
== 6.1.0.7
== 6.1.0.3
== 6.1.0.17
== 6.1.0.13
<= 6.1.0.29
== 6.1.0.15
== 6.1.0.23
== 6.1.0
== 6.1.0.5
== 7.0.0.5
== 7.0
== 7.0.0.7
== 7.0.0.3
== 7.0.0.1