U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-0899

Change History

Modified Analysis by NIST 11/08/2018 3:37:09 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:ibm:integrated_solutions_console:6.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:* versions up to (including) 6.1.0.24
     *cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:* versions up to (including) 7.0.0.4
     *cpe:2.3:a:ibm:websphere_portal:5.1.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_portal:5.1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_portal:5.1.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_portal:5.1.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_portal:5.1.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_portal:5.1.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_portal:6.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:ibm:integrated_solutions_console:6.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:* versions from (including) 6.1 up to (including) 6.1.0.24
     *cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:* versions from (including) 7.0 up to (including) 7.0.0.4
     *cpe:2.3:a:ibm:websphere_portal:*:*:*:*:*:*:*:* versions from (including) 5.1 up to (excluding) 6.0.0.0
Changed Reference Type
http://www-1.ibm.com/support/docview.wss?uid=swg1PK78134 No Types Assigned
http://www-1.ibm.com/support/docview.wss?uid=swg1PK78134 Vendor Advisory
Changed Reference Type
http://www.securityfocus.com/bid/35406 No Types Assigned
http://www.securityfocus.com/bid/35406 Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/50882 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/50882 Third Party Advisory, VDB Entry