Vulnerabilities > IBM > Rational Team Concert > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-08 | CVE-2020-4544 | Information Exposure Through an Error Message vulnerability in IBM products IBM Jazz Foundation Products could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. | 4.3 |
2021-01-08 | CVE-2020-4487 | Information Exposure Through an Error Message vulnerability in IBM products IBM Jazz Foundation Products could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. | 4.3 |
2020-09-02 | CVE-2020-4546 | Cross-site Scripting vulnerability in IBM products IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. | 5.4 |
2020-09-02 | CVE-2020-4522 | Cross-site Scripting vulnerability in IBM products IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. | 5.4 |
2020-09-02 | CVE-2020-4445 | Cross-site Scripting vulnerability in IBM products IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. | 5.4 |
2020-07-16 | CVE-2019-4748 | Cross-site Scripting vulnerability in IBM products IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. | 5.4 |
2020-07-16 | CVE-2019-4747 | Cross-site Scripting vulnerability in IBM products IBM Team Concert (RTC) is vulnerable to cross-site scripting. | 5.4 |
2019-06-27 | CVE-2019-4250 | Cross-site Scripting vulnerability in IBM products IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) is vulnerable to cross-site scripting. | 5.4 |
2019-06-27 | CVE-2019-4249 | Cross-site Scripting vulnerability in IBM products IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. | 5.4 |
2019-06-27 | CVE-2019-4084 | Unspecified vulnerability in IBM products IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) could allow an authenticated user to obtain sensitive information from CLM Applications that could be used in further attacks against the system. | 4.3 |