| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-13734 | IBM Engineering Requirements Management DOORS Next could allow an authenticated user to access and modify data beyond authorized permissions | IBM | Engineering Requirements Management DOORS Next | Medium | 5.4 | 2026-03-03 19:51:48 | Deep Dive |
| CVE-2025-2138 | IBM Engineering Requirements Management Doors Next data modification | IBM | Engineering Requirements Management Doors Next | Low | 3.5 | 2025-10-12 13:37:02 | Deep Dive |
| CVE-2025-2139 | IBM Engineering Requirements Management Doors Next security bypass | IBM | Engineering Requirements Management Doors Next | Low | 3.5 | 2025-10-12 13:35:25 | Deep Dive |
| CVE-2025-2140 | IBM Engineering Requirements Management Doors Next spoofing | IBM | Engineering Requirements Management Doors Next | Medium | 5.7 | 2025-10-12 13:33:23 | Deep Dive |
| CVE-2025-33096 | IBM Engineering Requirements Management Doors Next denial of service | IBM | Engineering Requirements Management Doors Next | Medium | 6.5 | 2025-10-12 13:31:05 | Deep Dive |
| CVE-2024-43190 | IBM Engineering Requirements Management DOORS weak authentication | IBM | Engineering Requirements Management DOORS | Medium | 5.9 | 2025-07-07 17:45:51 | Deep Dive |
| CVE-2024-41771 | IBM Engineering Requirements Management DOORS Next information disclosure | IBM | Engineering Requirements Management DOORS Next | High | 7.5 | 2025-03-03 15:29:15 | Deep Dive |
| CVE-2024-41770 | IBM Engineering Requirements Management DOORS Next information disclosure | IBM | Engineering Requirements Management DOORS Next | High | 7.5 | 2025-03-03 15:28:57 | Deep Dive |
| CVE-2024-43169 | IBM Engineering Requirements Management DOORS Next file download | IBM | Engineering Requirements Management DOORS Next | High | 8.8 | 2025-03-03 15:27:30 | Deep Dive |
| CVE-2024-41787 | IBM Engineering Requirements Management DOORS Next code execution | IBM | Engineering Requirements Management DOORS Next | Critical | 9.8 | 2025-01-10 13:18:52 | Deep Dive |
| CVE-2023-50304 | IBM Engineering Requirements Management DOORS XML external entity injection | IBM | Engineering Requirements Management DOORS | High | 7.1 | 2024-07-18 16:01:38 | Deep Dive |
| CVE-2023-45192 | IBM Engineering Requirements Management DOORS Next XML external entity injection | IBM | Engineering Requirements Management DOORS Next | High | 8.2 | 2024-06-06 18:49:06 | Deep Dive |
| CVE-2023-28949 | IBM Engineering Requirements Management cross-site request forgery | IBM | Engineering Requirements Management | Medium | 6.5 | 2024-03-01 01:47:15 | Deep Dive |
| CVE-2023-50305 | IBM Engineering Requirements Management information disclosure | IBM | Engineering Requirements Management | Medium | 5.1 | 2024-03-01 01:44:34 | Deep Dive |
| CVE-2023-28525 | IBM Engineering Requirements Management cross-site scripting | IBM | Engineering Requirements Management | Medium | 4.8 | 2024-03-01 01:41:49 | Deep Dive |