CVE-2016-0282
Published Nov 24, 2016
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in IBM iNotes before 8.5.3 FP6 IF2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, aka SPR KLYHAAHNUS.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF04F0F8-E2AC-4080-91CE-E871CF32FBB1" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8865EB47-3C1B-485B-94CA-852F1C40FDE7" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FA02A70-D433-4AEB-B7CD-77744E52D280" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84F5294B-DAEF-4450-81C1-AEB951364336" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EF658AD-31D5-4A88-920E-98B722D48355" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C029E446-2BBA-491D-9AA0-D83A3879CCBC" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "618F1C0E-8E43-4D63-A497-9FFEE4E3A90D" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53A4CC23-6053-40FC-BFC8-08FAA9F0AE53" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA621B45-7747-491D-A983-DD125BEE2753" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA57E455-B3CB-4F53-854B-21D8DFB95ED1" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E0153C-BDC4-4D01-A292-AD97A5C168EA" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4ED4C08-82E5-4165-A585-E23E23015609" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56D81A39-EA3A-4440-B026-8E8A4506C65D" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76D0D493-1BFD-4054-BDB0-F338BFAFDC5F" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F088F719-F4BE-4B49-B022-96D43664155B" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7F797B7-C3EA-4A12-8D69-217FBD4B9EB1" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFCA4DA1-302C-42AD-9317-DC733A17696B" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B102407C-3CCE-45A5-A3A2-9C24D5F4866A" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "577AA3FA-31BA-429C-8CE6-B3776F5CF857" }, { "criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A01616C-AEEB-40A0-AB35-0F615ADF8ADC" } ], "operator": "OR" } ] } ]