CVE-2021-20519
📊 5.4 MEDIUM⚡ 0.2%🎯 0 exploits
📅 Published Apr 12, 2021
📋 Status: Modified
IBM Jazz Team Server products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198441.
CVSS v3.1 • NVD
🎯 Affected Products & Systems
38 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | ibm | collaborative lifecycle management | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | collaborative lifecycle management | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | collaborative lifecycle management | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | doors next | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | doors next | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | doors next | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering insights | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering insights | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering insights | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering lifecycle management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering lifecycle management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering lifecycle management | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering requirements management doors next | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering requirements management doors next | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | engineering requirements management doors next | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | engineering test management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering test management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering test management | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | engineering workflow management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | engineering workflow management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | engineering workflow management | 7.0.2 | Vulnerable | cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational engineering lifecycle manager | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational engineering lifecycle manager | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rational engineering lifecycle manager | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | rational quality manager | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational quality manager | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rational quality manager | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | rational team concert | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rational team concert | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rational team concert | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 7.0.0 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:* |
📱App | ibm | removable media management | 7.0.1 | Vulnerable | cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:* |
📱App | ibm | rhapsody model manager | 6.0.2 | Vulnerable | cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:* |
📱App | ibm | rhapsody model manager | 6.0.6 | Vulnerable | cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:* |
📱App | ibm | rhapsody model manager | 6.0.6.1 | Vulnerable | cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:doors_next:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.2
CPE:
cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:removable_media_management:6.0.6.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.0
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.0:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 7.0.1
CPE:
cpe:2.3:a:ibm:removable_media_management:7.0.1:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.2
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: 6.0.6.1
CPE:
cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*
38 products•scroll for more
Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
LOW
User Interaction:
REQUIRED
Confidentiality:
LOW
Integrity:
LOW
Availability:
NONE
Scope:
CHANGED
🔍 Technical Details
Analysis Status
ModifiedCVSS Details
5.4 (MEDIUM)v3.1
Source: [email protected]
EPSS Details
0.2% (Minimal)37.2th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Apr 12, 2021 (4 years ago)
Last Modified
Nov 21, 2024 (11 months ago)
Security Weaknesses1
CWE-79
References3
NVDpatchadvisory