VYPR

Engineering Requirements Management DOORS Next

by IBM

CVEs (7)

  • CVE-2025-13734Mar 3, 2026
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management DOORS Next 7.1, and 7.2 could allow an authenticated user to view and edit data beyond their authorized access permissions.

  • CVE-2025-2138Oct 12, 2025
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to delete comments from other users due to client-side enforcement of server-side security.

  • CVE-2025-2139Oct 12, 2025
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to delete reviews from other users due to client-side enforcement of server-side security.

  • CVE-2025-2140Oct 12, 2025
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to spoof email identity of the sender due to improper verification of source data.

  • CVE-2025-33096Oct 12, 2025
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.

  • CVE-2025-1826Oct 7, 2025
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management DOORS Next (IBM Jazz Foundation 7.0.2 to 7.0.2 iFix034, 7.0.3 to 7.0.3 iFix016, and 7.1.0 to 7.1.0 iFix004) is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users on the host network to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

  • CVE-2024-43190Jul 7, 2025
    risk 0.00cvss epss 0.00

    IBM Engineering Requirements Management DOORS 9.7.2.9, under certain configurations, could allow a remote attacker to obtain password reset instructions of a legitimate user using man in the middle techniques.