3.3
CVE-2015-7449
- EPSS 0.02%
- Published 20.03.2018 21:29:00
- Last modified 21.11.2024 02:36:48
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM Rational Collaborative Lifecycle Management (CLM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, 6.0.x before 6.0.1 iFix5, and 6.0.2 before iFix2; Rational Quality Manager (RQM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, 6.0.x before 6.0.1 iFix5, and 6.0.2 before iFix2; Rational Team Concert (RTC) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, 6.0.x before 6.0.1 iFix5, and 6.0.2 before iFix2; Rational Requirements Composer (RRC) 4.0.x before 4.0.7 iFix10; Rational DOORS Next Generation (RDNG) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, 6.0.x before 6.0.1 iFix5, and 6.0.2 before iFix2; Rational Engineering Lifecycle Manager (RELM) 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7 before iFix1, 5.0.x before 5.0.2 iFix1, and 6.0.x before 6.0.2; Rational Rhapsody Design Manager (Rhapsody DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, 6.0.x before 6.0.1 iFix5, and 6.0.2 before iFix2; Rational Software Architect Design Manager (RSA DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, 6.0.x before 6.0.1 iFix5, and 6.0.2 before iFix2 allow local users to obtain sensitive information by leveraging weak encryption. IBM X-Force ID: 108221.
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Rational Collaborative Lifecycle Management Version >= 4.0.0 <= 6.0.2
Ibm ≫ Rational Quality Manager Version >= 4.0.0 <= 4.0.7
Ibm ≫ Rational Quality Manager Version5.0.0
Ibm ≫ Rational Quality Manager Version5.0.1
Ibm ≫ Rational Quality Manager Version5.0.2
Ibm ≫ Rational Quality Manager Version6.0.0
Ibm ≫ Rational Quality Manager Version6.0.1
Ibm ≫ Rational Quality Manager Version6.0.2
Ibm ≫ Rational Team Concert Version >= 4.0.0 <= 4.0.7
Ibm ≫ Rational Team Concert Version5.0.0
Ibm ≫ Rational Team Concert Version5.0.1
Ibm ≫ Rational Team Concert Version5.0.2
Ibm ≫ Rational Team Concert Version6.0.0
Ibm ≫ Rational Team Concert Version6.0.1
Ibm ≫ Rational Team Concert Version6.0.2
Ibm ≫ Rational Requirements Composer Version >= 4.0.0 <= 4.0.7
Ibm ≫ Rational Doors Next Generation Version >= 4.0.0 <= 4.0.7
Ibm ≫ Rational Doors Next Generation Version5.0.0
Ibm ≫ Rational Doors Next Generation Version5.0.1
Ibm ≫ Rational Doors Next Generation Version5.0.2
Ibm ≫ Rational Doors Next Generation Version6.0.0
Ibm ≫ Rational Doors Next Generation Version6.0.1
Ibm ≫ Rational Doors Next Generation Version6.0.2
Ibm ≫ Rational Engineering Lifecycle Manager Version >= 4.0.3 <= 4.0.7
Ibm ≫ Rational Engineering Lifecycle Manager Version5.0.0
Ibm ≫ Rational Engineering Lifecycle Manager Version5.0.1
Ibm ≫ Rational Engineering Lifecycle Manager Version5.0.2
Ibm ≫ Rational Engineering Lifecycle Manager Version6.0.0
Ibm ≫ Rational Engineering Lifecycle Manager Version6.0.1
Ibm ≫ Rational Engineering Lifecycle Manager Version6.0.2
Ibm ≫ Rational Rhapsody Design Manager Version >= 4.0 <= 4.0.7
Ibm ≫ Rational Rhapsody Design Manager Version5.0.0
Ibm ≫ Rational Rhapsody Design Manager Version5.0.1
Ibm ≫ Rational Rhapsody Design Manager Version5.0.2
Ibm ≫ Rational Rhapsody Design Manager Version6.0.0
Ibm ≫ Rational Rhapsody Design Manager Version6.0.1
Ibm ≫ Rational Rhapsody Design Manager Version6.0.2
Ibm ≫ Rational Software Architect Design Manager Version >= 4.0.0 <= 4.0.7
Ibm ≫ Rational Software Architect Design Manager Version5.0.0
Ibm ≫ Rational Software Architect Design Manager Version5.0.1
Ibm ≫ Rational Software Architect Design Manager Version5.0.2
Ibm ≫ Rational Software Architect Design Manager Version6.0.0
Ibm ≫ Rational Software Architect Design Manager Version6.0.1
Ibm ≫ Rational Software Architect Design Manager Version6.0.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.023 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 3.3 | 1.8 | 1.4 |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-326 Inadequate Encryption Strength
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.