Unrated severityNVD Advisory· Published May 20, 2015· Updated May 6, 2026
CVE-2015-1920
CVE-2015-1920
Description
IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.47, 7.0 before 7.0.0.39, 8.0 before 8.0.0.11, and 8.5 before 8.5.5.6 allows remote attackers to execute arbitrary code by sending crafted instructions in a management-port session.
Affected products
78cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*+ 77 more
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.39:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.47:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.38:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www-01.ibm.com/support/docview.wssnvdPatchVendor Advisory
- www.securityfocus.com/bid/74439nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032249nvdThird Party AdvisoryVDB Entry
- www-01.ibm.com/support/docview.wssnvdNot Applicable
News mentions
0No linked articles in our index yet.