Vulnerabilities (CVE)

Vendor filter

Ibm Subscribe

Product filter

Pureapplication System Subscribe

Filter

7 total CVE
CVE Vendors Products Updated CVSS
CVE-2019-4241 1 Ibm 1 Pureapplication System 2019-10-09 4.6
IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authentication and obtain administrative access. IBM X-Force ID: 159467.
CVE-2019-4235 1 Ibm 1 Pureapplication System 2019-10-09 5.0
IBM PureApplication System 2.2.3.0 through 2.2.5.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 159417.
CVE-2019-4234 1 Ibm 1 Pureapplication System 2019-10-09 4.0
IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor. An attacker by intercepting the subsequent requests can bypass business logic to modify the pattern to unlocked state. IBM...
CVE-2019-4225 1 Ibm 1 Pureapplication System 2019-10-09 2.1
IBM PureApplication System 2.2.3.0 through 2.2.5.3 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 159242.
CVE-2019-4224 1 Ibm 1 Pureapplication System 2019-10-09 6.5
IBM PureApplication System 2.2.3.0 through 2.2.5.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database....
CVE-2014-6158 1 Ibm 2 Workload Deployer, Pureapplication System 2017-09-08 9.0
Multiple directory traversal vulnerabilities in the file-upload feature in IBM PureApplication System 1.0 before 1.0.0.4 iFix 10, 1.1 before 1.1.0.5, and 2.0 before 2.0.0.1 and Workload Deployer 3.1.0.7 before IF5 allow remote authenticated users...
CVE-2014-0960 1 Ibm 1 Pureapplication System 2017-08-29 6.6
IBM PureApplication System 1.0 before 1.0.0.4 cfix8 and 1.1 before 1.1.0.4 IF1 allows remote authenticated users to bypass intended access restrictions by establishing an SSH session from a deployed virtual machine.