CVE-2020-4964

📊 4.3 MEDIUM0.2%🎯 0 exploits
📅 Published Apr 12, 2021
📋 Status: Modified

IBM Jazz Team Server products contain an undisclosed vulnerability that could allow an authenticated user to present a customized message on the application which could be used to phish other users. IBM X-Force ID: 192419.

🎯 Affected Products & Systems

38 product configurations affected

Filter by type:
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*
38 productsscroll for more
Metrics
4.3 MEDIUMCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
LOW
User Interaction:
NONE
Confidentiality:
NONE
Integrity:
LOW
Availability:
NONE
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Modified
CVSS Details
4.3 (MEDIUM)v3.1
EPSS Details
0.2% (Minimal)36.7th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Apr 12, 2021 (4 years ago)
Last Modified
Nov 21, 2024 (11 months ago)
Security Weaknesses1
References3