IBM Jazz technology based products might allow an attacker to view work item titles that they do not have privilege to view.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rational_collaborative_lifecycle_management | Ibm | 4.0.0 | 4.0.0 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.1 | 4.0.1 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.2 | 4.0.2 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.3 | 4.0.3 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.4 | 4.0.4 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.5 | 4.0.5 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.6 | 4.0.6 |
Rational_collaborative_lifecycle_management | Ibm | 4.0.7 | 4.0.7 |
Rational_collaborative_lifecycle_management | Ibm | 5.0.0 | 5.0.0 |
Rational_collaborative_lifecycle_management | Ibm | 5.0.1 | 5.0.1 |
Rational_collaborative_lifecycle_management | Ibm | 5.0.2 | 5.0.2 |
Rational_collaborative_lifecycle_management | Ibm | 6.0.0 | 6.0.0 |
Rational_collaborative_lifecycle_management | Ibm | 6.0.1 | 6.0.1 |
Rational_collaborative_lifecycle_management | Ibm | 6.0.2 | 6.0.2 |