Vulnerabilities > IBM > Rational Doors Next Generation > 5.0.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-05 | CVE-2016-9700 | Information Exposure vulnerability in IBM products IBM Jazz Foundation could allow an authenticated attacker to obtain sensitive information from error message stack traces. | 4.3 |
2017-06-12 | CVE-2017-1278 | Cross-site Scripting vulnerability in IBM products IBM DOORS Next Generation (DNG/RRC) 4.0, 5.0 and 6.0 is vulnerable to HTML injection. | 5.4 |
2017-06-12 | CVE-2017-1276 | Cross-site Scripting vulnerability in IBM products IBM DOORS Next Generation (DNG/RRC) 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. | 5.4 |
2017-06-12 | CVE-2017-1247 | Cross-site Scripting vulnerability in IBM products IBM DOORS Next Generation (DNG/RRC) 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. | 5.4 |
2017-02-23 | CVE-2016-6055 | Cross-site Scripting vulnerability in IBM products IBM Rational DOORS Next Generation 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. | 5.4 |
2017-02-15 | CVE-2016-6060 | Information Exposure vulnerability in IBM products An undisclosed vulnerability in IBM Rational DOORS Next Generation 4.0, 5.0, and 6.0 could allow a JazzGuest user to see project names. | 4.3 |
2017-02-08 | CVE-2017-1128 | Cross-site Scripting vulnerability in IBM products IBM Rational DOORS Next Generation 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. | 5.4 |
2017-02-08 | CVE-2017-1127 | Cross-site Scripting vulnerability in IBM products IBM Rational DOORS Next Generation 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. | 5.4 |
2017-02-08 | CVE-2016-9748 | Information Exposure vulnerability in IBM products IBM Rational DOORS Next Generation 5.0 and 6.0 discloses sensitive information in error response messages that could be used for further attacks against the system. | 4.3 |
2017-02-01 | CVE-2016-2987 | Information Exposure vulnerability in IBM products An undisclosed vulnerability in CLM applications may result in some administrative deployment parameters being shown to an attacker. | 4.3 |