IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Engineering_requirements_management_doors_next | Ibm | 7.0.2 (including) | 7.0.2 (including) |
Engineering_requirements_management_doors_next | Ibm | 7.0.3 (including) | 7.0.3 (including) |
Engineering_requirements_management_doors_next | Ibm | 7.1 (including) | 7.1 (including) |