IBM Jazz technology based products might allow an attacker to view work item titles that they do not have privilege to view.Referenceshttp://www.securityfocus.com/bid/95111https://www.ibm.com/support/docview.wss?uid=swg21996097