Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF04F0F8-E2AC-4080-91CE-E871CF32FBB1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8865EB47-3C1B-485B-94CA-852F1C40FDE7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FA02A70-D433-4AEB-B7CD-77744E52D280", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "84F5294B-DAEF-4450-81C1-AEB951364336", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0EF658AD-31D5-4A88-920E-98B722D48355", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C029E446-2BBA-491D-9AA0-D83A3879CCBC", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "618F1C0E-8E43-4D63-A497-9FFEE4E3A90D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "53A4CC23-6053-40FC-BFC8-08FAA9F0AE53", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA621B45-7747-491D-A983-DD125BEE2753", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA57E455-B3CB-4F53-854B-21D8DFB95ED1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "96E0153C-BDC4-4D01-A292-AD97A5C168EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A4ED4C08-82E5-4165-A585-E23E23015609", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "56D81A39-EA3A-4440-B026-8E8A4506C65D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "76D0D493-1BFD-4054-BDB0-F338BFAFDC5F", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F088F719-F4BE-4B49-B022-96D43664155B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B7F797B7-C3EA-4A12-8D69-217FBD4B9EB1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AFCA4DA1-302C-42AD-9317-DC733A17696B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B102407C-3CCE-45A5-A3A2-9C24D5F4866A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "577AA3FA-31BA-429C-8CE6-B3776F5CF857", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:lotus_inotes:8.5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A01616C-AEEB-40A0-AB35-0F615ADF8ADC", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in IBM iNotes before 8.5.3 FP6 IF2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, aka SPR KLYHAAHNUS."}, {"lang": "es", "value": "Vulnerabilidad de XSS en IBM iNotes en versiones anteriores a 8.5.3 FP6 IF2 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URL manipulada, vulnerabilidad tambi\u00e9n conocida como SPR KLYHAAHNUS."}], "id": "CVE-2016-0282", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-11-24T19:59:03.707", "references": [{"source": "psirt@us.ibm.com", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991722"}, {"source": "psirt@us.ibm.com", "url": "http://www.securityfocus.com/bid/94558"}, {"source": "psirt@us.ibm.com", "url": "http://www.securitytracker.com/id/1037383"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21991722"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/94558"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037383"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}