Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:connections:4.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1786E8E0-3A05-4845-8184-BC980C8FDF53", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:connections:4.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "548B3376-1304-4289-A9A8-1B967C0425FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:connections:5.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E36F2948-3B6C-4F31-A08C-C80E908FBF02", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:connections:5.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B309632B-7039-4E34-8766-96ECF00D5F34", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 through CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML by uploading an HTML document."}, {"lang": "es", "value": "Vulnerabilidad de XSS en IBM Connections 4.0 hasta la versi\u00f3n CR4, 4.5 hasta la versi\u00f3n CR5, 5.0 hasta la versi\u00f3n CR4 y 5.5 en versiones anteriores a CR1 permite a usuarios remotos autenticados inyectar secuencia de comandos web o HTML arbitrarios cargando un documento HTML."}], "id": "CVE-2016-0322", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-06-30T01:59:00.140", "references": [{"source": "psirt@us.ibm.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO88783"}, {"source": "psirt@us.ibm.com", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982611"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO88783"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21982611"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}