IBM Jazz technology based products might allow an attacker to view work item titles that they do not have privilege to view.
[
{
"product": "Rational Collaborative Lifecycle Management",
"vendor": "IBM Corporation",
"versions": [
{
"status": "affected",
"version": "3.0.1"
},
{
"status": "affected",
"version": "4.0"
},
{
"status": "affected",
"version": "3.0.1.6"
},
{
"status": "affected",
"version": "4.0.1"
},
{
"status": "affected",
"version": "4.0.2"
},
{
"status": "affected",
"version": "4.0.3"
},
{
"status": "affected",
"version": "4.0.4"
},
{
"status": "affected",
"version": "4.0.5"
},
{
"status": "affected",
"version": "4.0.6"
},
{
"status": "affected",
"version": "5.0"
},
{
"status": "affected",
"version": "4.0.7"
},
{
"status": "affected",
"version": "5.0.1"
},
{
"status": "affected",
"version": "5.0.2"
},
{
"status": "affected",
"version": "6.0"
},
{
"status": "affected",
"version": "6.0.1"
},
{
"status": "affected",
"version": "6.0.2"
},
{
"status": "affected",
"version": "6.0.3"
}
]
}
]