Vulnerabilities > IBM > Pureapplication System

DATE CVE VULNERABILITY TITLE RISK
2019-06-26 CVE-2019-4241 Unspecified vulnerability in IBM Pureapplication System
IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authentication and obtain administrative access.
local
low complexity
ibm
7.8
2019-06-26 CVE-2019-4235 Weak Password Requirements vulnerability in IBM Pureapplication System
IBM PureApplication System 2.2.3.0 through 2.2.5.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
network
low complexity
ibm CWE-521
7.5
2019-06-26 CVE-2019-4234 Unspecified vulnerability in IBM Pureapplication System
IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor.
network
low complexity
ibm
4.3
2019-06-26 CVE-2019-4225 Information Exposure Through Log Files vulnerability in IBM Pureapplication System
IBM PureApplication System 2.2.3.0 through 2.2.5.3 stores potentially sensitive information in log files that could be read by a local user.
local
low complexity
ibm CWE-532
4.4
2019-06-26 CVE-2019-4224 SQL Injection vulnerability in IBM Pureapplication System
IBM PureApplication System 2.2.3.0 through 2.2.5.3 is vulnerable to SQL injection.
network
low complexity
ibm CWE-89
8.8
2014-09-25 CVE-2014-7169 OS Command Injection vulnerability in multiple products
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.
9.8
2014-09-24 CVE-2014-6271 OS Command Injection vulnerability in multiple products
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
9.8