Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
rational_software_architect_design_manager Vendor: ibm

About This Product

rational_software_architect_design_manager is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 81 known vulnerabilities affecting ibm rational_software_architect_design_manager. This includes 4 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2013 to 2019, indicating a sustained research interest and ongoing security attention. 68 medium-severity issues and 9 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-3042 2013-12-14 2025-04-11 - 2.1 Unknown
CVE-2013-3043 2013-12-14 2025-04-11 - 2.1 Unknown
CVE-2013-5459 2014-04-21 2025-04-12 - 5.5 Likely
CVE-2014-0947 2014-07-30 2025-04-12 - 6.0 Unknown
CVE-2014-0948 2014-07-30 2025-04-12 - 6.0 Unknown
CVE-2014-3037 2014-09-10 2025-04-12 - 6.0 Unknown
CVE-2014-3092 2014-09-12 2025-04-12 - 5.0 Likely
CVE-2015-0113 2015-04-27 2025-04-12 - 5.0 Likely
CVE-2015-0112 2015-06-07 2025-04-12 - 4.0 Likely
CVE-2015-1928 2016-01-02 2025-04-12 6.8 3.5 Unknown
CVE-2015-1971 2016-01-03 2025-04-12 4.3 3.3 Unknown
CVE-2015-4946 2016-01-03 2025-04-12 3.3 2.1 Unknown
CVE-2015-4962 2016-01-03 2025-04-12 3.5 2.7 Unknown
CVE-2016-0273 2016-11-24 2025-04-12 5.4 3.5 Unknown
CVE-2016-0284 2016-11-24 2025-04-12 5.4 5.5 Likely
CVE-2016-0372 2016-11-24 2025-04-12 3.7 4.3 Likely
CVE-2016-2864 2016-11-24 2025-04-12 5.4 3.5 Unknown
CVE-2016-2947 2016-11-25 2025-04-12 2.7 4.0 Likely
CVE-2016-2926 2016-11-25 2025-04-12 5.4 3.5 Unknown
CVE-2016-3014 2016-11-30 2025-04-12 5.4 3.5 Unknown
CVE-2016-2987 2017-02-01 2025-04-20 4.3 4.0 Likely
CVE-2016-9707 2017-03-31 2025-04-20 8.1 7.5 Likely
CVE-2016-9735 2017-05-15 2025-04-20 4.3 4.0 Likely
CVE-2016-9973 2017-06-13 2025-04-20 5.4 3.5 Unknown
CVE-2017-1099 2017-06-13 2025-04-20 4.3 4.0 Likely
CVE-2016-9700 2017-07-05 2025-04-20 4.3 4.0 Likely
CVE-2017-1245 2017-07-24 2025-04-20 5.4 3.5 Unknown
CVE-2016-6024 2017-11-27 2025-04-20 4.3 4.0 Likely
CVE-2017-1240 2017-11-27 2025-04-20 4.3 4.0 Likely
CVE-2017-1251 2017-11-27 2025-04-20 4.3 4.0 Likely
CVE-2017-1570 2017-11-27 2025-04-20 4.3 4.0 Likely
CVE-2017-1507 2017-12-11 2025-04-20 4.3 4.0 Likely
CVE-2017-1191 2017-12-27 2025-04-20 4.3 4.0 Likely
CVE-2017-1365 2017-12-27 2025-04-20 5.4 3.5 Unknown
CVE-2016-0219 2018-01-16 2024-11-21 6.5 4.0 Likely
CVE-2017-1653 2018-01-26 2024-11-21 5.4 3.5 Unknown
CVE-2015-7440 2018-03-15 2024-11-21 7.8 4.6 Unknown
CVE-2015-7453 2018-03-15 2024-11-21 6.1 4.3 Likely
CVE-2015-7471 2018-03-15 2024-11-21 4.8 3.5 Unknown
CVE-2015-7449 2018-03-20 2024-11-21 3.3 2.1 Unknown
CVE-2017-1524 2018-03-23 2024-11-21 4.3 4.0 Likely
CVE-2017-1602 2018-03-23 2024-11-21 4.3 4.0 Likely
CVE-2017-1629 2018-03-23 2024-11-21 5.4 3.5 Unknown
CVE-2017-1655 2018-03-23 2024-11-21 5.4 3.5 Unknown
CVE-2017-1762 2018-03-23 2024-11-21 5.4 3.5 Unknown
CVE-2017-1700 2018-04-24 2024-11-21 6.5 4.0 Likely
CVE-2017-1725 2018-04-24 2024-11-21 4.3 4.0 Likely
CVE-2017-1734 2018-04-24 2024-11-21 4.3 4.0 Likely
CVE-2018-1456 2018-06-06 2024-11-21 7.1 5.5 Likely
CVE-2017-1237 2018-07-06 2024-11-21 5.4 3.5 Unknown
CVE-2017-1488 2018-07-06 2024-11-21 3.7 5.0 Likely
CVE-2017-1509 2018-07-06 2024-11-21 4.3 4.0 Likely
CVE-2017-1559 2018-07-06 2024-11-21 3.1 4.0 Likely
CVE-2018-1423 2018-07-10 2024-11-21 4.3 4.0 Likely
CVE-2018-1492 2018-07-10 2024-11-21 4.3 4.6 Unknown
CVE-2018-1535 2018-07-19 2024-11-21 5.4 3.5 Unknown
CVE-2018-1536 2018-07-19 2024-11-21 5.4 3.5 Unknown
CVE-2018-1585 2018-07-19 2024-11-21 5.4 3.5 Unknown
CVE-2018-1587 2018-07-19 2024-11-21 4.3 4.0 Likely
CVE-2017-1753 2018-08-20 2024-11-21 5.4 3.5 Unknown
CVE-2018-1394 2018-08-20 2024-11-21 5.4 3.5 Unknown
CVE-2018-1558 2018-10-02 2024-11-21 5.4 3.5 Unknown
CVE-2018-1606 2018-11-06 2024-11-21 4.3 4.0 Likely
CVE-2018-1694 2018-11-06 2024-11-21 5.9 4.3 Likely
CVE-2018-1762 2018-11-29 2024-11-21 5.4 3.5 Unknown
CVE-2018-1688 2019-03-14 2024-11-21 5.4 3.5 Unknown
CVE-2018-1916 2019-03-14 2024-11-21 5.4 3.5 Unknown
CVE-2018-1952 2019-03-14 2024-11-21 5.4 3.5 Unknown
CVE-2018-1734 2019-06-27 2024-11-21 4.3 4.0 Likely
CVE-2018-1758 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1760 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1826 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1827 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1828 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1892 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2018-1893 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2019-4083 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2019-4084 2019-06-27 2024-11-21 4.3 4.0 Likely
CVE-2019-4249 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2019-4250 2019-06-27 2024-11-21 5.4 3.5 Unknown
CVE-2019-4252 2019-06-27 2024-11-21 7.5 5.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm rational_software_architect_design_manager by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.