Vulnerabilities > IBM > Rational Team Concert > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-02 | CVE-2018-1558 | Cross-site Scripting vulnerability in IBM products IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-08-20 | CVE-2018-1394 | Cross-site Scripting vulnerability in IBM products Multiple IBM Rational products are vulnerable to cross-site scripting. | 5.4 |
2018-08-20 | CVE-2017-1753 | Code Injection vulnerability in IBM products Multiple IBM Rational products are vulnerable to HTML injection. | 5.4 |
2018-07-10 | CVE-2018-1492 | Session Fixation vulnerability in IBM products IBM Jazz Foundation products could allow a user with physical access to the system to log in as another user due to the server's failure to properly log out from the previous session. | 6.8 |
2018-07-10 | CVE-2018-1423 | Information Exposure vulnerability in IBM products IBM Jazz Foundation products could disclose sensitive information to an authenticated attacker that could be used in further attacks against the system. | 6.5 |
2018-07-10 | CVE-2018-1521 | Cross-site Scripting vulnerability in IBM Rational Team Concert IBM Rational Team Concert 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. | 5.4 |
2018-07-10 | CVE-2018-1408 | Cross-site Scripting vulnerability in IBM Rational Team Concert IBM Rational Team Concert 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. | 5.4 |
2018-07-10 | CVE-2018-1407 | Cross-site Scripting vulnerability in IBM Rational Team Concert IBM Rational Team Concert 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. | 5.4 |
2018-07-06 | CVE-2017-1559 | Information Exposure vulnerability in IBM products Multiple IBM Rational products could disclose sensitive information by an attacker that intercepts vulnerable requests. | 4.3 |
2018-07-06 | CVE-2017-1509 | Information Exposure vulnerability in IBM products IBM Jazz Foundation products could allow an authenticated user to obtain sensitive information from a stack trace that could be used to aid future attacks. | 4.3 |