Known Vulnerabilities for Pureapplication System by Ibm

Listed below are 8 of the newest known vulnerabilities associated with "Pureapplication System" by "Ibm".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2019-4241 IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authenticati... 7.8 - HIGH 2019-06-26 2022-12-02
CVE-2019-4235 IBM PureApplication System 2.2.3.0 through 2.2.5.3 does not require that users should have strong passwords by default, which... 7.5 - HIGH 2019-06-26 2022-12-02
CVE-2019-4234 IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor. An at... 4.3 - MEDIUM 2019-06-26 2022-12-02
CVE-2019-4225 IBM PureApplication System 2.2.3.0 through 2.2.5.3 stores potentially sensitive information in log files that could be read b... 4.4 - MEDIUM 2019-06-26 2023-02-03
CVE-2019-4224 IBM PureApplication System 2.2.3.0 through 2.2.5.3 is vulnerable to SQL injection. A remote attacker could send specially-cra... 8.8 - HIGH 2019-06-26 2022-12-03
CVE-2015-0235 Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allow... 10 - HIGH 2015-01-28 2022-07-05
CVE-2014-6158 Multiple directory traversal vulnerabilities in the file-upload feature in IBM PureApplication System 1.0 before 1.0.0.4 iFix... 9 - HIGH 2015-01-10 2017-09-08
CVE-2014-0960 IBM PureApplication System 1.0 before 1.0.0.4 cfix8 and 1.1 before 1.1.0.4 IF1 allows remote authenticated users to bypass in... 6.6 - MEDIUM 2014-06-14 2017-08-29

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIbmPureapplication System2.2.6.0AllAllAll
ApplicationIbmPureapplication System2.2.5.3AllAllAll
ApplicationIbmPureapplication System2.2.5.2AllAllAll
ApplicationIbmPureapplication System2.2.5.1AllAllAll
ApplicationIbmPureapplication System2.2.5.0AllAllAll
ApplicationIbmPureapplication System2.2.4.0AllAllAll
ApplicationIbmPureapplication System2.2.3.2AllAllAll
ApplicationIbmPureapplication System2.2.3.1AllAllAll
ApplicationIbmPureapplication System2.2.3.0AllAllAll
ApplicationIbmPureapplication System2.2.2.2AllAllAll
ApplicationIbmPureapplication System2.2.2.1AllAllAll
ApplicationIbmPureapplication System2.2.2.0AllAllAll
ApplicationIbmPureapplication System2.2.1.0AllAllAll
ApplicationIbmPureapplication System2.2.0.0AllAllAll
ApplicationIbmPureapplication System2.1.2.4AllAllAll
ApplicationIbmPureapplication System2.1.2.3AllAllAll
ApplicationIbmPureapplication System2.1.2.1AllAllAll
ApplicationIbmPureapplication System2.1.2.0AllAllAll
ApplicationIbmPureapplication System2.1.1.0AllAllAll
ApplicationIbmPureapplication System2.1.0.2AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report