{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T19:51:09.998","vulnerabilities":[{"cve":{"id":"CVE-2018-1606","sourceIdentifier":"psirt@us.ibm.com","published":"2018-11-06T16:29:00.343","lastModified":"2024-11-21T04:00:04.997","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Jazz based applications (IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational DOORS Next Generation 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Quality Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Rhapsody Design Manager 5.0 through 5.02 and 6.0 through 6.0.6, IBM Rational Software Architect Design Manager 5.0 through 5.02 and 6.0 through 6.0.1, IBM Rational Team Concert 5.0 through 5.02 and 6.0 through 6.0.6) could allow an authenticated user to obtain sensitive information from an error message that could be used in further attacks against the system. IBM X-Force ID: 143796."},{"lang":"es","value":"Las aplicaciones basadas en IBM Jazz (IBM Rational Collaborative Lifecycle Management en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.6, IBM Rational DOORS Next Generation en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.6, IBM Rational Engineering Lifecycle Manager en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.6, IBM Rational Quality Manager en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.6, IBM Rational Rhapsody Design Manager en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.6, IBM Rational Software Architect Design Manager en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.1, y IBM Rational Team Concert en versiones 5.0 hasta la 5.02 y versiones 6.0 hasta la 6.0.6) podría permitir que un usuario autenticado obtenga información sensible de un mensaje de error que podría emplearse en más ataques contra el sistema. IBM X-Force ID: 143796."}],"metrics":{"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"667D04CD-BC8D-4CEB-B502-8D1379B7B436"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_doors_next_generation:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.2","matchCriteriaId":"F5C09499-13C3-4F91-A68D-C8FEB77B18DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_doors_next_generation:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"8DDB2D08-0405-4BFD-9DBE-0AD8589B18FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.2","matchCriteriaId":"8BABC587-0E98-4CE1-AD8C-4045D3CA2941"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"74E00B0B-14E3-4799-9FD6-63418A8086F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.2","matchCriteriaId":"4EB5653C-C3DD-471B-B644-6E3128CA7401"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"45C503A9-6837-4EBD-87E5-2CA76AF85B79"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_rhapsody_design_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.2","matchCriteriaId":"3A1EBFE0-1EA4-46A9-866B-3ED2E1187612"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_rhapsody_design_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"AA1F2828-9730-4474-82B4-E08AD40CBAAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_software_architect_design_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.2","matchCriteriaId":"A48EFB76-A843-46B9-8840-83DC35330DD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_software_architect_design_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.1","matchCriteriaId":"98DCDC04-6FD5-49CB-BC20-757A69C4AC0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_team_concert:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.2","matchCriteriaId":"909CD52D-BC7A-467F-A88B-15150C6A41ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:rational_team_concert:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"8789F641-3AFA-4262-B554-DEB4270D1DB5"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=ibm10738301","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/143796","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=ibm10738301","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/143796","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]}]}}]}