First published: Tue Mar 04 2014(Updated: )
Unspecified vulnerability in IBM Rational Requirements Composer 3.x before 3.0.1.6 iFix2 and 4.x before 4.0.6, and Rational DOORS Next Generation 4.x before 4.0.6, allows remote authenticated users to read arbitrary data via unknown vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational Requirements Composer | =3.0.1 | |
IBM Rational Requirements Composer | =3.0.1.1 | |
IBM Rational Requirements Composer | =3.0.1.2 | |
IBM Rational Requirements Composer | =3.0.1.3 | |
IBM Rational Requirements Composer | =3.0.1.4 | |
IBM Rational Requirements Composer | =3.0.1.5 | |
IBM Rational Requirements Composer | =3.0.1.6 | |
IBM Rational Requirements Composer | =4.0.0 | |
IBM Rational Requirements Composer | =4.0.0.1 | |
IBM Rational Requirements Composer | =4.0.0.2 | |
IBM Rational Requirements Composer | =4.0.1 | |
IBM Rational Requirements Composer | =4.0.2 | |
IBM Rational Requirements Composer | =4.0.3 | |
IBM Rational Requirements Composer | =4.0.4 | |
IBM Rational Requirements Composer | =4.0.5 | |
IBM Rational DOORS Next Generation | =4.0.0 | |
IBM Rational DOORS Next Generation | =4.0.1 | |
IBM Rational DOORS Next Generation | =4.0.2 | |
IBM Rational DOORS Next Generation | =4.0.3 | |
IBM Rational DOORS Next Generation | =4.0.4 | |
IBM Rational DOORS Next Generation | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.