First published: Fri Apr 09 2021(Updated: )
IBM Jazz Foundation uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM RDNG | <=6.0.2 | |
IBM DOORS Next | <=7.0.2 | |
IBM DOORS Next | <=7.0 | |
IBM DOORS Next | <=7.0.1 | |
IBM RDNG | <=6.0.6.1 | |
IBM RDNG | <=6.0.6 | |
IBM RQM | <=6.0.6.1 | |
IBM ETM | <=7.0.1 | |
IBM RQM | <=6.0.6 | |
IBM ETM | <=7.0.0 | |
IBM RQM | <=6.0.2 | |
IBM ETM | <=7.0.2 | |
IBM RMM | <=7.0.1 | |
IBM Rhapsody Model Manager | <=6.0.6 | |
IBM RMM | <=6.0.6.1 | |
IBM Rhapsody Model Manager | <=6.0.2 | |
IBM RMM | <=6.0.6 | |
IBM Rhapsody Model Manager | <=6.0.6.1 | |
IBM RMM | <=7.0 | |
IBM RMM | <=6.0.2 | |
IBM EWM | <=7.0.1 | |
IBM RTC | <=6.0.2 | |
IBM RTC | <=6.0.6.1 | |
IBM EWM | <=7.0 | |
IBM RTC | <=6.0.6 | |
IBM EWM | <=7.0.2 | |
IBM CLM | <=6.0.6.1 | |
IBM CLM | <=6.0.6 | |
IBM ELM | <=7.0 | |
IBM CLM | <=6.0.2 | |
IBM ELM | <=7.0.1 | |
IBM ELM | <=7.0.2 | |
IBM RELM | <=6.0.6.1 | |
IBM ENI | <=7.0.1 | |
IBM RELM | <=6.0.6 | |
IBM ENI | <=7.0 | |
IBM RELM | <=6.0.2 | |
IBM ENI | <=7.0.2 | |
Ibm Collaborative Lifecycle Management | =6.0.2 | |
Ibm Collaborative Lifecycle Management | =6.0.6 | |
Ibm Collaborative Lifecycle Management | =6.0.6.1 | |
IBM DOORS Next | =7.0.0 | |
IBM DOORS Next | =7.0.1 | |
IBM DOORS Next | =7.0.2 | |
Ibm Engineering Insights | =7.0.0 | |
Ibm Engineering Insights | =7.0.1 | |
Ibm Engineering Insights | =7.0.2 | |
IBM Engineering Lifecycle Management | =7.0.0 | |
IBM Engineering Lifecycle Management | =7.0.1 | |
IBM Engineering Lifecycle Management | =7.0.2 | |
IBM Engineering Requirements Management DOORS Next | =6.0.2 | |
IBM Engineering Requirements Management DOORS Next | =6.0.6 | |
IBM Engineering Requirements Management DOORS Next | =6.0.6.1 | |
IBM Engineering Test Management | =7.0.0 | |
IBM Engineering Test Management | =7.0.1 | |
IBM Engineering Test Management | =7.0.2 | |
IBM Engineering Workflow Management | =7.0.0 | |
IBM Engineering Workflow Management | =7.0.1 | |
IBM Engineering Workflow Management | =7.0.2 | |
IBM Rational Engineering Lifecycle Manager | =6.0.2 | |
IBM Rational Engineering Lifecycle Manager | =6.0.6 | |
IBM Rational Engineering Lifecycle Manager | =6.0.6.1 | |
IBM Rational Quality Manager | =6.0.2 | |
IBM Rational Quality Manager | =6.0.6 | |
IBM Rational Quality Manager | =6.0.6.1 | |
IBM Rational Team Concert | =6.0.2 | |
IBM Rational Team Concert | =6.0.6 | |
IBM Rational Team Concert | =6.0.6.1 | |
Ibm Removable Media Management | =6.0.2 | |
Ibm Removable Media Management | =6.0.6 | |
Ibm Removable Media Management | =6.0.6.1 | |
Ibm Removable Media Management | =7.0.0 | |
Ibm Removable Media Management | =7.0.1 | |
IBM Rhapsody Model Manager | =6.0.2 | |
IBM Rhapsody Model Manager | =6.0.6 | |
IBM Rhapsody Model Manager | =6.0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.