Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9CE0A31B-7A9B-40E6-8648-365D018BA0E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E54DB-5CB0-4289-B1A7-EA82494A8FEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B2944B8-BFD1-4184-8E49-69385DD0C0D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "71ECC4C2-BF61-47C7-8435-BE71F1AD0A88", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A79E7EF2-5615-4300-BC0D-865DBDC8B46F", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C59EB6D6-2A74-4988-912C-97045647F1ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB61F7-B5B4-47E8-8BFD-02F025358781", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F93D8CAB-0DF0-4A1D-B1A3-78FF892D04AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7204792C-1506-4E95-92CD-098F760FC429", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "09FC134C-08AB-4874-B31D-B08CDF4C2DE4", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "1649F910-F8B9-4AAD-9743-C37B8784A771", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "CEDB1D69-FFD1-49DB-9775-B11F21E200F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "443530AE-4F33-4453-826A-8D705DFB7C03", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "364E7E8D-D988-4546-9E61-CD2D1A6F0728", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D34C6DE1-40BC-44F3-B106-47E4FA1C4FF7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB0AA277-39E7-441C-9AF2-18848FD4C9D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4938F063-34AF-4C5F-AF43-534C3D052720", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "3902033E-35AB-4358-9D07-AF8C59A9621A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "559C7C20-BD07-4E30-A74C-EA35DB2E3F2B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B15D55E2-D1C2-4934-8C51-2DA2778ADF7B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AC0F2747-175E-4B85-9020-162F019860EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9B31F581-9E7A-4882-A915-FE4784FDC996", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA1E396E-905A-4CE3-8AEB-12BFBE679B2E", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x through 2.0.1.1, 3.x before 3.0.1.6 iFix 4, 4.x before 4.0.7 iFix 2, and 5.x before 5.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."}, {"lang": "es", "value": "Vulnerabilidad de XSS en IBM Rational Quality Manager 2.x hasta 2.0.1.1, 3.x anteriores a 3.0.1.6 iFix 4, 4.x anteriores a 4.0.7 iFix 2 y 5.x anteriores a 5.0.1 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URL manipulada."}], "id": "CVE-2014-4801", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-12-19T02:59:00.077", "references": [{"source": "psirt@us.ibm.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692615"}, {"source": "psirt@us.ibm.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95303"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692615"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95303"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}