Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
websphere_portal Vendor: ibm

About This Product

websphere_portal is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 128 known vulnerabilities affecting ibm websphere_portal. This includes 17 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2007 to 2018, indicating a sustained research interest and ongoing security attention. 96 medium-severity issues and 15 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-3127 2007-06-19 2025-04-09 - 5.0 Likely
CVE-2007-3128 2007-06-19 2025-04-09 - 6.4 Likely
CVE-2008-3423 2008-08-04 2025-04-09 - 7.5 Likely
CVE-2008-5675 2008-12-19 2025-04-09 - 10.0 Likely
CVE-2009-1008 2009-04-15 2025-04-09 - 4.4 Unknown
CVE-2009-1009 2009-04-15 2025-04-09 - 4.4 Unknown
CVE-2009-1010 2009-04-15 2025-04-09 - 4.4 Unknown
CVE-2009-0899 2009-06-03 2025-04-09 - 4.3 Likely
CVE-2009-4152 2009-12-02 2025-04-09 - 4.3 Likely
CVE-2009-4153 2009-12-02 2025-04-09 - 7.5 Likely
CVE-2010-0704 2010-02-25 2025-04-11 - 4.3 Likely
CVE-2010-0714 2010-02-26 2025-04-11 - 4.3 Likely
CVE-2010-0715 2010-02-26 2025-04-11 - 6.8 Likely
CVE-2010-1348 2010-04-12 2025-04-11 - 7.5 Likely
CVE-2010-4219 2010-11-09 2025-04-11 - 4.3 Likely
CVE-2011-0679 2011-01-28 2025-04-11 - 5.0 Likely
CVE-2011-2172 2011-05-26 2025-04-11 - 4.3 Likely
CVE-2011-2173 2011-05-26 2025-04-11 - 4.0 Likely
CVE-2011-2754 2011-07-17 2025-04-11 - 4.3 Likely
CVE-2012-2181 2012-07-03 2025-04-11 - 5.0 Likely
CVE-2012-4834 2012-11-30 2025-04-11 - 5.0 Likely
CVE-2013-0549 2013-06-03 2025-04-11 - 4.3 Likely
CVE-2013-2950 2013-06-03 2025-04-11 - 3.5 Unknown
CVE-2013-0587 2013-08-16 2025-04-11 - 4.3 Likely
CVE-2013-3016 2013-08-21 2025-04-11 - 5.0 Likely
CVE-2013-5378 2013-11-13 2025-04-11 - 3.5 Unknown
CVE-2013-5379 2013-11-13 2025-04-11 - 3.5 Unknown
CVE-2013-5454 2013-11-18 2025-04-11 - 4.3 Likely
CVE-2013-4012 2013-12-22 2025-04-11 - 4.9 Unknown
CVE-2013-6316 2013-12-22 2025-04-11 - 4.3 Likely
CVE-2013-6328 2013-12-22 2025-04-11 - 4.3 Likely
CVE-2013-6723 2013-12-22 2025-04-11 - 5.0 Likely
CVE-2013-6735 2013-12-22 2025-04-11 - 5.0 Likely
CVE-2013-6722 2014-02-14 2025-04-11 - 5.8 Likely
CVE-2014-0855 2014-02-14 2025-04-11 - 4.3 Likely
CVE-2013-6730 2014-03-04 2025-04-12 - 4.3 Likely
CVE-2014-0828 2014-04-02 2025-04-12 - 4.3 Likely
CVE-2014-0901 2014-04-02 2025-04-12 - 3.5 Unknown
CVE-2014-0917 2014-05-16 2025-04-12 - 4.3 Likely
CVE-2014-0918 2014-05-16 2025-04-12 - 7.1 Likely
CVE-2014-0949 2014-05-22 2025-04-12 - 5.0 Likely
CVE-2014-0951 2014-05-22 2025-04-12 - 4.3 Likely
CVE-2014-0952 2014-05-22 2025-04-12 - 4.3 Likely
CVE-2014-0954 2014-05-22 2025-04-12 - 6.8 Likely
CVE-2014-0955 2014-05-22 2025-04-12 - 4.3 Likely
CVE-2014-0956 2014-05-22 2025-04-12 - 4.3 Likely
CVE-2014-0958 2014-05-22 2025-04-12 - 5.8 Likely
CVE-2014-0959 2014-05-22 2025-04-12 - 4.0 Likely
CVE-2014-0910 2014-06-18 2025-04-12 - 3.5 Unknown
CVE-2014-3054 2014-07-29 2025-04-12 - 5.8 Likely
CVE-2014-3055 2014-07-29 2025-04-12 - 7.5 Likely
CVE-2014-3056 2014-07-29 2025-04-12 - 5.0 Likely
CVE-2014-3057 2014-07-29 2025-04-12 - 4.3 Likely
CVE-2014-0953 2014-08-12 2025-04-12 - 4.3 Likely
CVE-2014-3102 2014-08-12 2025-04-12 - 3.5 Unknown
CVE-2014-4746 2014-08-12 2025-04-12 - 5.0 Likely
CVE-2014-4760 2014-08-12 2025-04-12 - 5.8 Likely
CVE-2014-4762 2014-09-12 2025-04-12 - 3.5 Unknown
CVE-2014-4792 2014-09-12 2025-04-12 - 4.0 Likely
CVE-2014-4761 2014-10-10 2025-04-12 - 4.0 Likely
CVE-2014-4808 2014-10-28 2025-04-12 - 6.5 Likely
CVE-2014-4814 2014-10-28 2025-04-12 - 3.5 Unknown
CVE-2014-4821 2014-10-28 2025-04-12 - 5.0 Likely
CVE-2014-6125 2014-10-28 2025-04-12 - 6.8 Likely
CVE-2014-6126 2014-10-28 2025-04-12 - 4.3 Likely
CVE-2014-6093 2014-11-26 2025-04-12 - 3.5 Unknown
CVE-2014-6215 2014-12-11 2025-04-12 - 3.5 Unknown
CVE-2014-6171 2014-12-19 2025-04-12 - 4.3 Likely
CVE-2014-6193 2014-12-19 2025-04-12 - 4.9 Unknown
CVE-2014-8902 2014-12-19 2025-04-12 - 4.3 Likely
CVE-2014-8909 2015-02-13 2025-04-12 - 3.5 Unknown
CVE-2014-6214 2015-03-13 2025-04-12 - 6.8 Likely
CVE-2015-0139 2015-03-13 2025-04-12 - 3.5 Unknown
CVE-2015-0177 2015-03-13 2025-04-12 - 3.5 Unknown
CVE-2015-1886 2015-04-27 2025-04-12 - 7.8 Likely
CVE-2015-1908 2015-04-27 2025-04-12 - 4.3 Likely
CVE-2015-1899 2015-05-25 2025-04-12 - 7.8 Likely
CVE-2015-1921 2015-05-25 2025-04-12 - 6.4 Likely
CVE-2015-1887 2015-07-14 2025-04-12 - 5.0 Likely
CVE-2015-1917 2015-07-14 2025-04-12 - 4.3 Likely
CVE-2015-1944 2015-07-14 2025-04-12 - 3.5 Unknown
CVE-2015-1943 2015-09-14 2025-04-12 - 7.8 Likely
CVE-2015-0195 2015-10-03 2025-04-12 - 4.3 Likely
CVE-2014-8912 2015-10-28 2025-04-12 - 5.0 Likely
CVE-2015-4997 2015-10-29 2025-04-12 - 6.8 Likely
CVE-2015-7419 2015-11-14 2025-04-12 - 7.8 Likely
CVE-2015-4993 2015-12-21 2025-04-12 6.1 4.3 Likely
CVE-2015-4998 2015-12-21 2025-04-12 6.1 4.3 Likely
CVE-2015-5001 2015-12-21 2025-04-12 4.3 6.8 Likely
CVE-2015-7413 2015-12-21 2025-04-12 - 4.3 Likely
CVE-2015-7447 2015-12-31 2025-04-12 5.3 5.0 Likely
CVE-2016-0209 2016-01-27 2025-04-12 6.1 4.3 Likely
CVE-2015-7472 2016-02-15 2025-04-12 7.2 6.4 Likely
CVE-2015-7428 2016-02-29 2025-04-12 7.4 5.8 Likely
CVE-2015-7455 2016-02-29 2025-04-12 3.1 4.0 Likely
CVE-2015-7457 2016-02-29 2025-04-12 6.1 4.3 Likely
CVE-2015-7491 2016-02-29 2025-04-12 5.4 3.5 Unknown
CVE-2016-0243 2016-02-29 2025-04-12 6.1 4.3 Likely
CVE-2016-0244 2016-02-29 2025-04-12 6.1 4.3 Likely
CVE-2016-0245 2016-02-29 2025-04-12 5.4 5.5 Likely
CVE-2016-2901 2016-06-26 2025-04-12 8.8 6.8 Likely
CVE-2016-2925 2016-08-08 2025-04-12 5.4 3.5 Unknown
CVE-2016-5954 2016-09-12 2025-04-12 6.5 4.0 Likely
CVE-2016-8922 2017-02-01 2025-04-20 6.1 4.3 Likely
CVE-2017-1120 2017-03-27 2025-04-20 6.1 4.3 Likely
CVE-2017-1156 2017-05-05 2025-04-20 8.8 6.8 Likely
CVE-2017-1217 2017-07-05 2025-04-20 6.1 4.3 Likely
CVE-2017-1303 2017-07-31 2025-12-04 6.1 4.3 Likely
CVE-2017-1189 2017-09-07 2025-04-20 6.1 4.3 Likely
CVE-2017-1577 2017-09-28 2025-04-20 7.5 5.0 Likely
CVE-2017-1536 2017-12-11 2025-04-20 5.4 3.5 Unknown
CVE-2017-1423 2017-12-20 2025-04-20 5.3 5.0 Likely
CVE-2017-1698 2017-12-27 2025-04-20 5.3 5.0 Likely
CVE-2018-1361 2018-01-11 2024-11-21 6.1 4.3 Likely
CVE-2017-1761 2018-02-09 2024-11-21 6.1 4.3 Likely
CVE-2018-1401 2018-02-09 2024-11-21 6.1 4.3 Likely
CVE-2018-1416 2018-02-27 2024-11-21 6.1 4.3 Likely
CVE-2018-1444 2018-03-14 2024-11-21 5.4 3.5 Unknown
CVE-2018-1483 2018-04-11 2024-11-21 6.1 4.3 Likely
CVE-2018-1445 2018-04-17 2024-11-21 5.4 3.5 Unknown
CVE-2013-2951 2018-07-11 2024-11-21 7.8 2.1 Unknown
CVE-2018-1660 2018-09-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1716 2018-09-27 2024-11-21 6.1 4.3 Likely
CVE-2018-1736 2018-09-27 2024-11-21 7.4 5.8 Likely
CVE-2018-1820 2018-09-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1420 2018-10-01 2024-11-21 5.3 4.0 Likely
CVE-2018-1672 2018-10-01 2024-11-21 5.0 6.5 Likely
CVE-2018-1673 2018-10-12 2024-11-21 6.1 4.3 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm websphere_portal by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.