Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
websphere_mq Vendor: ibm

About This Product

websphere_mq is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 89 known vulnerabilities affecting ibm websphere_mq. This includes 1 critical-severity issue and 18 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2007 to 2022, indicating a sustained research interest and ongoing security attention. 56 medium-severity issues and 14 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-6044 2007-11-20 2025-04-09 - 10.0 Likely
CVE-2008-1130 2008-03-04 2025-04-09 - 6.6 Unknown
CVE-2007-6705 2008-03-09 2025-04-09 - 3.3 Unknown
CVE-2008-1592 2008-03-31 2025-04-09 - 4.6 Unknown
CVE-2009-0439 2009-02-24 2025-04-09 - 7.2 Unknown
CVE-2009-0896 2009-06-03 2025-04-09 - 10.0 Likely
CVE-2009-3159 2009-09-10 2025-04-09 - 7.8 Likely
CVE-2009-3160 2009-09-10 2025-04-09 - 8.8 Likely
CVE-2009-3161 2009-09-10 2025-04-09 - 7.8 Likely
CVE-2010-0772 2010-04-27 2025-04-11 - 4.0 Likely
CVE-2010-0782 2010-10-20 2025-04-11 - 4.3 Likely
CVE-2010-2637 2010-11-12 2025-04-11 - 4.3 Likely
CVE-2010-2638 2010-11-15 2025-04-11 - 4.0 Likely
CVE-2011-0314 2011-01-12 2025-04-11 - 6.5 Likely
CVE-2011-0310 2011-01-13 2025-04-11 - 6.8 Likely
CVE-2011-1224 2011-07-07 2025-04-11 - 4.3 Likely
CVE-2010-0780 2011-10-29 2025-04-11 - 4.3 Likely
CVE-2009-0900 2011-10-30 2025-04-11 - 4.1 Unknown
CVE-2009-0905 2011-10-30 2025-04-11 - 1.7 Unknown
CVE-2011-1378 2011-11-26 2025-04-11 - 1.9 Unknown
CVE-2012-2206 2012-08-17 2025-04-11 - 3.5 Unknown
CVE-2012-3294 2012-08-17 2025-04-11 - 6.8 Likely
CVE-2012-3295 2012-08-29 2025-04-11 - 4.3 Likely
CVE-2012-2199 2012-09-25 2025-04-11 - 5.0 Likely
CVE-2013-3028 2013-07-02 2025-04-11 - 4.6 Unknown
CVE-2013-4054 2014-03-02 2025-04-12 - 4.3 Likely
CVE-2014-0911 2014-05-07 2025-04-12 - 4.3 Likely
CVE-2014-4793 2014-10-02 2025-04-12 - 6.5 Likely
CVE-2014-4822 2014-10-19 2025-04-12 - 1.9 Unknown
CVE-2014-6116 2014-10-19 2025-04-12 - 4.3 Likely
CVE-2014-4771 2015-02-13 2025-04-12 - 3.5 Unknown
CVE-2015-0176 2015-04-27 2025-04-12 - 4.3 Likely
CVE-2015-0189 2015-05-20 2025-04-12 - 4.0 Likely
CVE-2015-1967 2015-07-01 2025-04-12 - 4.3 Likely
CVE-2015-2013 2015-09-14 2025-04-12 - 5.0 Likely
CVE-2015-2012 2016-02-08 2025-04-12 4.0 2.1 Unknown
CVE-2015-7462 2016-06-19 2025-04-12 4.4 2.1 Unknown
CVE-2015-7473 2016-06-26 2025-04-12 2.5 2.1 Unknown
CVE-2016-0259 2016-06-26 2025-04-12 2.5 2.1 Unknown
CVE-2016-0260 2016-06-29 2025-04-12 7.5 5.0 Likely
CVE-2016-0379 2016-09-26 2025-04-12 3.1 3.5 Unknown
CVE-2016-3013 2017-02-22 2025-04-20 6.5 4.0 Likely
CVE-2016-3052 2017-02-22 2025-04-20 5.9 4.3 Likely
CVE-2016-8915 2017-02-22 2025-04-20 6.5 4.0 Likely
CVE-2016-8986 2017-02-22 2025-04-20 6.5 4.0 Likely
CVE-2016-9009 2017-02-24 2025-04-20 3.1 4.0 Likely
CVE-2016-8971 2017-03-07 2025-04-20 6.5 6.8 Likely
CVE-2017-1145 2017-03-20 2025-04-20 8.6 7.8 Likely
CVE-2016-6089 2017-06-07 2025-04-20 5.5 3.6 Unknown
CVE-2017-1117 2017-06-21 2025-04-20 5.3 3.5 Unknown
CVE-2017-1236 2017-07-06 2025-04-20 6.5 4.0 Likely
CVE-2017-1284 2017-07-10 2025-04-20 4.7 1.9 Unknown
CVE-2017-1337 2017-07-10 2025-04-20 8.1 4.3 Likely
CVE-2017-1285 2017-07-12 2025-04-20 6.5 4.0 Likely
CVE-2017-1235 2017-09-25 2025-04-20 6.5 4.0 Likely
CVE-2017-1283 2017-11-27 2025-04-20 4.3 4.0 Likely
CVE-2017-1341 2017-12-07 2025-04-20 3.7 4.3 Likely
CVE-2017-1433 2017-12-07 2025-04-20 6.5 4.0 Likely
CVE-2017-1760 2017-12-11 2025-04-20 7.1 3.6 Unknown
CVE-2017-1557 2018-01-02 2024-11-21 4.3 4.0 Likely
CVE-2017-1699 2018-01-04 2024-11-21 3.3 3.6 Unknown
CVE-2017-1612 2018-01-09 2024-11-21 7.8 4.6 Unknown
CVE-2018-1388 2018-02-07 2024-11-21 7.5 5.0 Likely
CVE-2017-1747 2018-03-30 2024-11-21 5.3 4.0 Likely
CVE-2015-1957 2018-04-10 2024-11-21 5.3 3.5 Unknown
CVE-2018-1371 2018-04-17 2024-11-21 6.5 4.0 Likely
CVE-2017-1786 2018-04-23 2024-11-21 5.3 3.5 Unknown
CVE-2018-1419 2018-06-15 2024-11-21 3.7 3.5 Unknown
CVE-2018-1374 2018-06-26 2024-11-21 5.3 4.0 Likely
CVE-2018-1543 2018-06-27 2024-11-21 5.9 4.3 Likely
CVE-2018-1503 2018-07-23 2024-11-21 4.3 4.0 Likely
CVE-2018-1551 2018-08-06 2024-11-21 3.1 6.0 Unknown
CVE-2018-1684 2018-11-09 2024-11-21 5.3 4.0 Likely
CVE-2018-1792 2018-11-13 2024-11-21 8.8 7.2 Unknown
CVE-2018-1974 2019-03-11 2024-11-21 7.5 6.0 Unknown
CVE-2018-1998 2019-03-11 2024-11-21 8.8 7.2 Unknown
CVE-2018-1925 2019-04-15 2024-11-21 5.9 4.3 Likely
CVE-2019-4039 2019-05-23 2024-11-21 5.5 2.1 Unknown
CVE-2019-4078 2019-05-23 2024-11-21 7.8 7.2 Unknown
CVE-2019-4261 2019-08-05 2024-11-21 6.5 4.0 Likely
CVE-2019-4141 2019-09-27 2024-11-21 6.5 4.0 Likely
CVE-2012-4863 2020-01-23 2024-11-21 6.5 4.0 Likely
CVE-2019-4619 2020-03-16 2024-11-21 5.5 2.1 Unknown
CVE-2019-4656 2020-03-16 2024-11-21 6.5 4.0 Likely
CVE-2019-4719 2020-03-16 2024-11-21 5.5 2.1 Unknown
CVE-2020-4310 2020-06-16 2024-11-21 7.5 5.0 Likely
CVE-2020-4682 2021-01-28 2024-11-21 9.8 10.0 Likely
CVE-2021-38949 2021-11-16 2024-11-21 5.5 2.1 Unknown
CVE-2012-2201 2022-09-29 2024-11-21 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm websphere_mq by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.