Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
rational_clearquest Vendor: ibm

About This Product

rational_clearquest is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 42 known vulnerabilities affecting ibm rational_clearquest. This includes 8 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2005 to 2024, indicating a sustained research interest and ongoing security attention. 30 medium-severity issues and 4 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-2994 2005-09-20 2025-04-03 - 6.8 Likely
CVE-2007-1468 2007-03-16 2025-04-09 - 4.3 Likely
CVE-2007-4368 2007-08-15 2025-04-09 - 7.5 Likely
CVE-2007-5090 2007-09-26 2025-04-09 - 7.5 Likely
CVE-2008-1287 2008-03-11 2025-04-09 - 5.0 Likely
CVE-2008-1288 2008-03-11 2025-04-09 - 5.0 Likely
CVE-2007-4592 2008-03-20 2025-04-09 - 4.3 Likely
CVE-2008-3550 2008-08-08 2025-04-09 - 5.0 Likely
CVE-2008-5324 2008-12-05 2025-04-09 - 4.3 Likely
CVE-2008-5325 2008-12-05 2025-04-09 - 4.3 Likely
CVE-2008-5326 2008-12-05 2025-04-09 - 4.4 Unknown
CVE-2008-5327 2008-12-05 2025-04-09 - 6.5 Likely
CVE-2008-5328 2008-12-05 2025-04-09 - 4.6 Unknown
CVE-2008-5329 2008-12-05 2025-04-09 - 7.5 Likely
CVE-2008-5330 2008-12-05 2025-04-09 - 4.3 Likely
CVE-2009-2211 2009-06-25 2025-04-09 - 4.3 Likely
CVE-2009-2212 2009-06-25 2025-04-09 - 5.0 Likely
CVE-2009-4357 2009-12-18 2025-04-09 - 5.0 Likely
CVE-2010-2517 2010-06-30 2025-04-11 - 7.5 Likely
CVE-2010-4600 2010-12-29 2025-04-11 - 5.0 Likely
CVE-2010-4601 2010-12-29 2025-04-11 - 10.0 Likely
CVE-2010-4602 2010-12-29 2025-04-11 - 4.0 Likely
CVE-2010-4603 2010-12-29 2025-04-11 - 6.5 Likely
CVE-2011-1205 2011-03-29 2025-04-11 - 6.9 Unknown
CVE-2012-0708 2012-04-22 2025-04-11 - 9.3 Likely
CVE-2011-1390 2012-05-14 2025-04-11 - 7.5 Likely
CVE-2012-0744 2012-08-17 2025-04-11 - 5.0 Likely
CVE-2012-2164 2012-08-17 2025-04-11 - 5.5 Likely
CVE-2012-2165 2012-08-17 2025-04-11 - 3.5 Unknown
CVE-2012-2168 2012-08-17 2025-04-11 - 4.0 Likely
CVE-2012-2169 2012-08-17 2025-04-11 - 3.5 Unknown
CVE-2012-2205 2012-08-17 2025-04-11 - 3.5 Unknown
CVE-2012-4839 2012-12-20 2025-04-11 - 4.3 Likely
CVE-2012-5765 2012-12-20 2025-04-11 - 5.0 Likely
CVE-2012-5757 2013-03-21 2025-04-11 - 4.3 Likely
CVE-2013-0598 2013-09-28 2025-04-11 - 6.8 Likely
CVE-2013-3041 2013-10-01 2025-04-11 - 4.3 Likely
CVE-2014-8925 2015-03-25 2025-04-12 - 6.8 Likely
CVE-2015-4996 2016-01-02 2025-04-12 5.1 3.6 Unknown
CVE-2014-0950 2018-04-20 2024-11-21 7.1 5.5 Likely
CVE-2016-2922 2018-08-13 2024-11-21 3.7 4.3 Likely
CVE-2024-28796 2024-07-17 2024-11-21 6.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm rational_clearquest by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.