CVE-2021-20519

📊 5.4 MEDIUM0.2%🎯 0 exploits
📅 Published Apr 12, 2021
📋 Status: Modified

IBM Jazz Team Server products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198441.

🎯 Affected Products & Systems

38 product configurations affected

Filter by type:
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
📱
Vulnerable
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*
38 productsscroll for more
Metrics
5.4 MEDIUMCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
LOW
User Interaction:
REQUIRED
Confidentiality:
LOW
Integrity:
LOW
Availability:
NONE
Scope:
CHANGED

🔍 Technical Details

Analysis Status
Modified
CVSS Details
5.4 (MEDIUM)v3.1
EPSS Details
0.2% (Minimal)37.2th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Apr 12, 2021 (4 years ago)
Last Modified
Nov 21, 2024 (11 months ago)
Security Weaknesses1
References3