CVE Vulnerabilities

CVE-2018-1694

Published: Nov 06, 2018 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

IBM Jazz applications (IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational DOORS Next Generation 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Quality Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Rhapsody Design Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Software Architect Design Manager 5.0 through 5.02 and 6.0 through 6.0.1, IBM Rational Team Concert 5.0 through 5.02 and 6.0 through 6.0.6) could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 145609.

Affected Software

NameVendorStart VersionEnd Version
Rational_collaborative_lifecycle_managementIbm5.0.0 (including)6.0.6 (including)
Rational_doors_next_generationIbm5.0.0 (including)5.0.2 (including)
Rational_doors_next_generationIbm6.0.0 (including)6.0.6 (including)
Rational_engineering_lifecycle_managerIbm5.0.0 (including)5.0.2 (including)
Rational_engineering_lifecycle_managerIbm6.0.0 (including)6.0.6 (including)
Rational_quality_managerIbm5.0.0 (including)5.0.2 (including)
Rational_quality_managerIbm6.0.0 (including)6.0.6 (including)
Rational_rhapsody_design_managerIbm5.0.0 (including)5.0.2 (including)
Rational_rhapsody_design_managerIbm6.0.0 (including)6.0.6 (including)
Rational_software_architect_design_managerIbm5.0.0 (including)5.0.2 (including)
Rational_software_architect_design_managerIbm6.0.0 (including)6.0.1 (including)
Rational_team_concertIbm5.0.0 (including)5.0.2 (including)
Rational_team_concertIbm6.0.0 (including)6.0.6 (including)

References