IBM Jazz technology based products might allow an attacker to view work item titles that they do not have privilege to view.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/95111 | third party advisory vdb entry |
https://www.ibm.com/support/docview.wss?uid=swg21996097 | patch vendor advisory |