Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
websphere_commerce Vendor: ibm

About This Product

websphere_commerce is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 43 known vulnerabilities affecting ibm websphere_commerce. This includes 1 critical-severity issue and 8 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2009 to 2018, indicating a sustained research interest and ongoing security attention. 27 medium-severity issues and 7 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-6973 2009-08-13 2025-04-09 - 10.0 Likely
CVE-2009-2094 2009-08-13 2025-04-09 - 1.5 Unknown
CVE-2009-2751 2010-02-05 2025-04-11 - 4.3 Likely
CVE-2009-2752 2010-02-05 2025-04-11 - 1.5 Unknown
CVE-2010-2635 2010-11-09 2025-04-11 - 6.5 Likely
CVE-2010-2636 2010-11-09 2025-04-11 - 4.3 Likely
CVE-2010-2639 2010-12-06 2025-04-11 - 5.0 Likely
CVE-2011-3577 2011-09-20 2025-04-11 - 10.0 Likely
CVE-2012-3298 2012-09-25 2025-04-11 - 10.0 Likely
CVE-2012-3300 2012-09-25 2025-04-11 - 2.6 Unknown
CVE-2012-4830 2012-10-01 2025-04-11 - 5.0 Likely
CVE-2012-4855 2013-03-05 2025-04-11 - 4.3 Likely
CVE-2013-0523 2013-06-21 2025-04-11 - 4.3 Likely
CVE-2013-2993 2013-08-01 2025-04-11 - 5.8 Likely
CVE-2013-2994 2013-08-01 2025-04-11 - 6.4 Likely
CVE-2013-0566 2013-08-27 2025-04-11 - 4.3 Likely
CVE-2013-2992 2013-09-09 2025-04-11 - 4.3 Likely
CVE-2014-0943 2014-05-25 2025-04-12 - 7.1 Likely
CVE-2014-4769 2014-11-05 2025-04-12 - 4.0 Likely
CVE-2014-4834 2014-11-05 2025-04-12 - 4.3 Likely
CVE-2015-0133 2015-03-13 2025-04-12 - 5.0 Likely
CVE-2014-6211 2015-05-20 2025-04-12 - 2.1 Unknown
CVE-2015-0200 2015-05-29 2025-04-12 - 2.1 Unknown
CVE-2015-0196 2015-06-29 2025-04-12 - 5.0 Likely
CVE-2015-4980 2015-09-14 2025-04-12 - 4.0 Likely
CVE-2015-7397 2016-01-10 2025-04-12 7.4 5.8 Likely
CVE-2015-5007 2016-01-15 2025-04-12 8.8 6.8 Likely
CVE-2015-5008 2016-01-18 2025-04-12 6.1 4.3 Likely
CVE-2015-5009 2016-01-18 2025-04-12 5.4 3.5 Unknown
CVE-2015-7444 2016-02-15 2025-04-12 5.3 5.0 Likely
CVE-2016-0225 2016-02-29 2025-04-12 4.9 4.0 Likely
CVE-2016-0208 2016-03-14 2025-04-12 3.7 4.3 Likely
CVE-2016-2862 2016-07-03 2025-04-12 6.1 4.3 Likely
CVE-2016-2863 2016-07-03 2025-04-12 8.0 6.0 Unknown
CVE-2016-6090 2017-02-01 2025-04-20 9.8 7.5 Likely
CVE-2016-5894 2017-03-08 2025-04-20 5.1 1.9 Unknown
CVE-2017-1170 2017-04-26 2025-04-20 5.3 4.6 Unknown
CVE-2017-1398 2017-07-10 2025-04-20 6.1 5.8 Likely
CVE-2017-1569 2017-10-03 2025-04-20 7.5 5.0 Likely
CVE-2017-1484 2017-11-27 2025-04-20 4.3 4.0 Likely
CVE-2018-1644 2018-08-27 2024-11-21 3.1 4.0 Likely
CVE-2018-1541 2018-10-24 2024-11-21 5.4 3.5 Unknown
CVE-2018-1808 2018-11-13 2024-11-21 4.3 6.5 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm websphere_commerce by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.