Vulnerabilities > IBM > Rational Doors Next Generation

DATE CVE VULNERABILITY TITLE RISK
2020-06-19 CVE-2020-4295 Cross-site Scripting vulnerability in IBM Doors Next and Rational Doors Next Generation
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting.
network
ibm CWE-79
3.5
2020-06-19 CVE-2020-4281 Cross-site Scripting vulnerability in IBM Doors Next and Rational Doors Next Generation
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting.
network
ibm CWE-79
3.5
2020-04-08 CVE-2020-4252 Cross-site Scripting vulnerability in IBM products
IBM DOORS Next Generation (DNG/RRC) 6.0.2.
network
ibm CWE-79
3.5
2020-04-08 CVE-2019-4746 Cross-site Scripting vulnerability in IBM products
IBM DOORS Next Generation (DNG/RRC) 6.0.2.
network
ibm CWE-79
3.5
2020-04-08 CVE-2019-4740 Cross-site Scripting vulnerability in IBM products
IBM DOORS Next Generation (DNG/RRC) 6.0.2.
network
ibm CWE-79
3.5
2020-04-08 CVE-2019-4737 Cross-site Scripting vulnerability in IBM products
IBM DOORS Next Generation (DNG/RRC) 6.0.2.
network
ibm CWE-79
3.5
2019-06-27 CVE-2019-4252 Path Traversal vulnerability in IBM products
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 could allow a remote attacker to traverse directories on the system.
network
low complexity
ibm CWE-22
7.5
2019-06-27 CVE-2019-4250 Cross-site Scripting vulnerability in IBM products
IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) is vulnerable to cross-site scripting.
network
low complexity
ibm CWE-79
5.4
2019-06-27 CVE-2019-4249 Cross-site Scripting vulnerability in IBM products
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting.
network
low complexity
ibm CWE-79
5.4
2019-06-27 CVE-2019-4084 Unspecified vulnerability in IBM products
IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) could allow an authenticated user to obtain sensitive information from CLM Applications that could be used in further attacks against the system.
network
low complexity
ibm
4.3