Ibm Websphere Vulnerabilità

Sequenza temporale

L'anno scorso

Versione

8.0163
8.5147
7.0123
9.0120
6.1.0.198

Contromisure

Official Fix582
Temporary Fix0
Workaround1
Unavailable2
Not Defined241

Sfruttabilità

High65
Functional0
Proof-of-Concept132
Unproven73
Not Defined556

Accesso al vettore

Not Defined0
Physical0
Local90
Adjacent11
Network725

Autenticazione

Not Defined0
High3
Low259
None564

Interazione dell'utente

Not Defined0
Required230
None596

C3BM Index

L'anno scorso

CVSSv3 Base

≤10
≤20
≤35
≤499
≤5200
≤6236
≤7114
≤8100
≤930
≤1042

CVSSv3 Temp

≤10
≤20
≤310
≤4120
≤5223
≤6241
≤7125
≤850
≤941
≤1016

VulDB

≤10
≤20
≤36
≤4136
≤5211
≤6198
≤7104
≤8108
≤921
≤1042

NVD

≤10
≤20
≤35
≤415
≤520
≤671
≤769
≤841
≤923
≤1014

CNA

≤10
≤20
≤30
≤411
≤520
≤643
≤719
≤88
≤95
≤100

Fornitore

≤10
≤20
≤30
≤40
≤50
≤62
≤74
≤81
≤92
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploiter 0 giorni

<1k0
<2k0
<5k5
<10k76
<25k495
<50k188
<100k62
≥100k0

Exploiter aujourd'hui

<1k554
<2k16
<5k65
<10k67
<25k119
<50k5
<100k0
≥100k0

Sfrutta il volume del mercato

L'anno scorso

🔴 CTI Attività

Affected Versions (540): 0.0.1, 1, 1.0, 1.0.0.1, 1.0.1, 1.3, 1.4.2, 1.4.3, 2, 2.0, 2.1, 2.1.0.1, 2.1.0.2, 2.1.0.3, 2.5, 2.5.0.1, 2.5.0.2, 2.5.0.3, 2.5.0.4, 3.0, 3.0.2, 3.0.2.1, 3.1, 3.1.1, 3.1.2, 3.2, 3.3, 3.4, 3.5, 3.5.1, 3.5.2, 3.5.3, 3.6, 3.6.1.5, 3.7, 3.7.3, 3.7.3.1, 3.7.3.2, 3.7.3.3, 3.7.3.4, 3.7.3.5, 3.7.3.6, 3.7.3.7, 3.7.3.8, 3.7.3.9, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16, 3.17, 3.18, 3.19, 3.20, 3.21, 3.22, 3.23, 3.24, 3.25, 3.26, 3.27, 3.28, 3.29, 3.30, 3.31, 3.32, 3.33, 3.34, 3.35, 3.36, 3.37, 3.38, 3.39, 3.40, 3.41, 3.42, 3.43, 3.44, 3.45, 3.46, 3.47, 3.48, 3.49, 3.50, 3.51, 3.52, 3.53, 4, 4.0.1, 4.0.1.1, 4.0.1.2, 4.0.1.3, 4.0.1.4, 4.0.1.5, 4.0.1.6, 4.0.1.7, 4.0.1.8, 4.0.1.9, 4.0.1.11, 4.0.1.12, 4.0.1.13, 4.0.1.14, 4.0.1.15, 4.0.1.16, 4.0.1.17, 4.0.1.18, 4.0.1.19, 4.0.1.21, 4.0.1.22, 4.0.1.23, 4.0.1.24, 4.0.1.25, 4.0.1.26, 4.0.3, 4.0.4, 4.1, 4.1.1, 5, 5.0, 5.0.1, 5.0.2, 5.0.2.1, 5.0.2.2, 5.0.2.3, 5.0.2.4, 5.0.2.5, 5.0.2.6, 5.0.2.7, 5.0.2.8, 5.0.2.9, 5.0.2.11, 5.02, 5.1, 5.1.0.1, 5.1.0.2, 5.1.0.3, 5.1.0.4, 5.1.1, 5.1.1.1, 5.1.1.2, 5.1.1.3, 5.1.1.4, 5.1.1.5, 5.1.1.6, 5.1.1.7, 5.1.1.8, 5.1.1.9, 5.1.1.11, 5.1.1.12, 5.1.1.13, 5.2, 5.3, 5.3.1, 5.6, 5.6.0.1, 5.6.0.2, 6, 6.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.0.0.4, 6.0.0.5, 6.0.0.6, 6.0.0.7, 6.0.0.8, 6.0.0.9, 6.0.0.11, 6.0.1, 6.0.1.1, 6.0.1.2, 6.0.1.3, 6.0.1.4, 6.0.1.5, 6.0.1.6, 6.0.1.7, 6.0.1.8, 6.0.1.9, 6.0.1.11, 6.0.2, 6.0.2.1, 6.0.2.2, 6.0.2.3, 6.0.2.4, 6.0.2.5, 6.0.2.6, 6.0.2.7, 6.0.2.8, 6.0.2.9, 6.0.2.11, 6.0.2.12, 6.0.2.13, 6.0.2.14, 6.0.2.15, 6.0.2.16, 6.0.2.17, 6.0.2.18, 6.0.2.19, 6.0.2.21, 6.0.2.22, 6.0.2.23, 6.0.2.24, 6.0.2.25, 6.0.2.26, 6.0.2.27, 6.0.2.28, 6.0.2.29, 6.0.2.31, 6.0.2.32, 6.0.2.33, 6.0.2.34, 6.0.2.35, 6.0.2.36, 6.0.2.37, 6.0.2.38, 6.0.2.39, 6.0.2.41, 6.0.2.42, 6.0.2.43, 6.1, 6.1.0.1, 6.1.0.2, 6.1.0.3, 6.1.0.4, 6.1.0.5, 6.1.0.6, 6.1.0.6 CF26, 6.1.0.6 CF27, 6.1.0.7, 6.1.0.8, 6.1.0.9, 6.1.0.11, 6.1.0.12, 6.1.0.13, 6.1.0.14, 6.1.0.15, 6.1.0.16, 6.1.0.17, 6.1.0.18, 6.1.0.19, 6.1.0.21, 6.1.0.22, 6.1.0.23, 6.1.0.24, 6.1.0.25, 6.1.0.26, 6.1.0.27, 6.1.0.28, 6.1.0.29, 6.1.0.31, 6.1.0.32, 6.1.0.33, 6.1.0.34, 6.1.0.35, 6.1.0.36, 6.1.0.37, 6.1.0.38, 6.1.0.39, 6.1.0.41, 6.1.0.42, 6.1.0.43, 6.1.0.44, 6.1.0.45, 6.1.0.46, 6.1.0.47, 6.1.1, 6.1.5, 6.1.5.1, 6.1.5.2, 6.1.5.3, 6.1.5.3 CF26, 6.1.5.3 CF27, 6.2, 6.3, 6.3.1, 6.7, 7, 7.0, 7.0 FP8, 7.0 Feature Pack 5, 7.0.0.0 FP8, 7.0.0.1, 7.0.0.2, 7.0.0.2 CF28, 7.0.0.2 CF29, 7.0.0.3, 7.0.0.4, 7.0.0.5, 7.0.0.6, 7.0.0.7, 7.0.0.8, 7.0.0.9, 7.0.0.11, 7.0.0.12, 7.0.0.13, 7.0.0.14, 7.0.0.15, 7.0.0.16, 7.0.0.17, 7.0.0.18, 7.0.0.19, 7.0.0.21, 7.0.0.22, 7.0.0.23, 7.0.0.24, 7.0.0.25, 7.0.0.26, 7.0.0.27, 7.0.0.28, 7.0.0.29, 7.0.0.31, 7.0.0.32, 7.0.0.33, 7.0.0.34, 7.0.0.35, 7.0.0.36, 7.0.0.37, 7.0.0.38, 7.0.0.39, 7.0.0.41, 7.0.0.42, 7.0.038, 7.0.1, 7.0.1.1, 7.0.1.2, 7.0.1.3, 7.0.1.4, 7.0.1.5, 7.0.1.6, 7.0.1.7, 7.0.1.8, 7.0.1.9, 7.0.1.11, 7.0.1.12, 7.0.3, 7.0.4, 7.1, 7.1.0.1, 7.1.0.2, 7.1.0.3, 7.1.0.4, 7.1.0.5, 7.1.0.6, 7.1.0.7, 7.1.0.8, 7.1.0.9, 7.1.1, 7.2, 7.3, 7.4, 7.5, 7.5.0.1, 7.5.0.2, 7.5.0.3, 7.5.0.4, 7.5.0.5, 7.5.0.6, 7.5.0.7, 7.5.0.8, 7.5.1, 7.5.2, 7.6, 8, 8.0, 8.0.0.1, 8.0.0.1 CF1, 8.0.0.1 CF2, 8.0.0.1 CF16, 8.0.0.1 CF17, 8.0.0.1 CF18, 8.0.0.1 CF19, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 8.0.0.9, 8.0.0.11, 8.0.0.12, 8.0.0.13, 8.0.0.14, 8.0.0.15, 8.0.0.16, 8.0.0.17, 8.0.0.18, 8.0.0.19, 8.0.1, 8.0.1.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 8.0.1.5, 8.0.1.6, 8.0.1.7, 8.0.1.8, 8.0.1.9, 8.0.1.11, 8.0.1.12, 8.0.1.13, 8.0.3, 8.0.3.1, 8.0.3.2, 8.0.3.3, 8.0.3.4, 8.0.3.5, 8.0.3.6, 8.0.4, 8.0.4.1, 8.0.4.2, 8.0.4.3, 8.0.4.4, 8.0.4.5, 8.0.4.6, 8.0.4.7, 8.0.4.8, 8.0.4.9, 8.0.4.11, 8.0.4.12, 8.0.4.13, 8.0.4.14, 8.1, 8.2, 8.3, 8.4, 8.4.0.1, 8.4.0.2, 8.5, 8.5 CF05, 8.5 CF10, 8.5.0 CF05, 8.5.0 CF07, 8.5.0 CF08, 8.5.0 CF09, 8.5.0 CF5, 8.5.0.0 CF08, 8.5.0.0 CF09, 8.5.0.1, 8.5.0.2, 8.5.1, 8.5.2, 8.5.3, 8.5.4, 8.5.5, 8.5.5.1, 8.5.5.2, 8.5.5.3, 8.5.5.4, 8.5.5.5, 8.5.5.6, 8.5.5.7, 8.5.5.8, 8.5.5.9, 8.6, 8.6.0.1, 8.6.0.2, 8.6.0.3, 8.6.0.4, 8.6.0.5, 8.6.0.6, 8.6.0.7, 8.6.0.8, 8.6.1, 9, 9.0, 9.0 LTS, 9.0.0.1, 9.0.0.2, 9.0.0.3, 9.0.0.4, 9.0.0.5, 9.0.0.6, 9.0.0.7, 9.0.0.8, 9.0.0.9, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.1, 9.1 CD, 9.1 LTS, 9.1.0.1, 9.1.1, 10.0, 16, 16.0.0.1, 16.0.0.2, 18, 18.0.0.1, 20.0.0.1, 20.0.0.2, 20.0.0.3, 20.0.0.4, 20.0.0.5, 20.0.0.6, 20.0.0.7, 20.0.0.8, 20.0.0.9, 21, 21.0.0.1, 21.0.0.2, 21.0.0.3, 21.0.0.4, 21.0.0.5, 21.0.0.6, 21.0.0.7, 21.0.0.8, 21.0.0.9, 21.0.0.11, 21.0.0.12, 22, 22.0.0.1, 22.0.0.2, 22.0.0.3, 22.0.0.4, 22.0.0.5, 22.0.0.6, 22.0.0.7, 23, 23.0.0.1, 23.0.0.2, 23.0.0.3, 23.0.0.4, 23.0.0.5, 23.0.0.6, 23.0.0.7, 23.0.0.8, 23.0.0.9, 24, 24.0.0.1, 24.0.0.2, 24.0.0.3, 145455

Link to Product Website: https://www.ibm.com/

Tipo di software: Application Server Software

Data di pubblicazioneBaseTempVulnerabilità0dayOggiSfrConCTICVE
17/04/20246.36.2IBM WebSphere Application Server XML External Entity$5k-$25k$5k-$25kNot DefinedOfficial Fix0.08CVE-2024-22354
17/04/20245.35.2IBM WebSphere Application Server escalazione di privilegi$5k-$25k$0-$5kNot DefinedOfficial Fix0.04CVE-2024-22329
04/04/20244.84.7IBM WebSphere Application Server Liberty Request denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-27268
02/04/20244.54.4IBM WebSphere Application Server TLS Configuration crittografia debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2023-50313
31/03/20245.95.8IBM WebSphere Application Server Liberty Request denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.07CVE-2024-22353
27/03/20244.54.4IBM WebSphere Application Server Liberty URI cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-27270
01/03/20244.24.1IBM WebSphere Application Server Liberty TLS crittografia debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2023-50312
25/10/20235.95.9IBM WebSphere Application Server Liberty crittografia debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2023-46158
16/08/20236.46.4IBM WebSphere Application Server Liberty Request denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.03CVE-2023-38737
07/07/20234.84.7IBM WebSphere Application Server Configuration File crittografia debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2023-35890
11/05/20237.06.9IBM WebSphere Application Server XML External Entity$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2023-27554
04/05/20234.64.6IBM WebSphere Application Server Web Server Plug-in autenticazione debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2022-39161
27/04/20235.25.1IBM WebSphere Application Server Web UI cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-24966
03/04/20234.44.4IBM WebSphere Application Server Web UI cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-26283
03/02/20239.29.1IBM WebSphere Application Server Sequence escalazione di privilegi$25k-$100k$5k-$25kNot DefinedOfficial Fix0.04CVE-2023-23477
27/01/20234.84.7IBM WebSphere Application Server crittografia debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-43917
02/12/20225.04.9IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps Network Connection autenticazione debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-43900
02/12/20224.94.9IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps rivelazione di un 'informazione$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-43901
12/11/20224.44.4IBM WebSphere Application Server Web UI cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.03CVE-2022-40750
04/11/20225.75.6IBM WebSphere Application Server Web Service escalazione di privilegi$5k-$25k$5k-$25kNot DefinedOfficial Fix0.00CVE-2022-38712
07/10/20225.55.5IBM WebSphere Automation for Cloud Pak for Watson AIOps cross site request forgery$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-22493
29/09/20225.95.8IBM WebSphere MQ SVRCONN Channel denial of service$5k-$25k$0-$5kNot DefinedOfficial Fix0.05CVE-2012-2201
29/09/20225.05.0IBM WebSphere Application Server Request escalazione di privilegi$25k-$100k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-35282
14/09/20224.84.7IBM WebSphere Application Server Web UI cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-34336
10/09/20225.75.6IBM WebSphere Application Server HTTP Header escalazione di privilegi$25k-$100k$0-$5kNot DefinedOfficial Fix0.00CVE-2022-34165

801 non vengono visualizzate più voci

altre voci di Ibm

Do you want to use VulDB in your project?

Use the official API to access entries easily!