{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T12:18:53.827","vulnerabilities":[{"cve":{"id":"CVE-2014-3075","sourceIdentifier":"psirt@us.ibm.com","published":"2014-09-04T10:55:06.817","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in IBM Business Process Manager (BPM) 7.5.x through 8.5.5 and WebSphere Lombardi Edition 7.2.0.x allows remote authenticated users to inject arbitrary web script or HTML via an uploaded file."},{"lang":"es","value":"Vulnerabilidad de XSS en IBM Business Process Manager (BPM) 7.5.x hasta 8.5.5 y WebSphere Lombardi Edition 7.2.0.x permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través de un fichero subido."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:M\/Au:S\/C:N\/I:P\/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"42264DE4-CEED-4FA5-8C77-82BF9A55F3F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"A5E78ECD-6FFA-4AA0-B8B4-F9C002D6F8EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"DAC02B89-813E-4B3D-B518-6565BE06C575"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"06DFA125-9D52-4C16-9946-DB8D43700415"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"613CC0CD-083E-439A-9A53-777E69CDE2DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"161542A0-E919-4105-AD4F-C881ACF8D26B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"AF8D1DC9-CB5E-4627-8689-B5FA7C5DE1C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*","matchCriteriaId":"32504DEB-7391-4452-BA2E-409959B24222"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*","matchCriteriaId":"D8F74820-DF10-499E-AF7A-93AC285843D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"989C89DF-C6CB-45C9-9592-30A83896BD71"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"783C2592-9669-4C75-9E63-C834482F6F8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*","matchCriteriaId":"7021B830-3EE4-446D-8D87-BBD2097A023E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:7.2:*:*:*:lombardi:*:*:*","matchCriteriaId":"8321428B-A26F-473A-9CE9-4651D72E6EB7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:7.2.0.1:*:*:*:lombardi:*:*:*","matchCriteriaId":"B17CAD84-9637-4166-A8D8-7EC784EF6130"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:7.2.0.2:*:*:*:lombardi:*:*:*","matchCriteriaId":"C3796DA7-CA75-4C5C-B5ED-F4468D5240C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:7.2.0.3:*:*:*:lombardi:*:*:*","matchCriteriaId":"05EB6216-7893-45CA-B731-C2E3B86F5D13"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:7.2.0.4:*:*:*:lombardi:*:*:*","matchCriteriaId":"3378FFC5-D787-448F-BF4C-5545A13C1BDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:7.2.0.5:*:*:*:lombardi:*:*:*","matchCriteriaId":"885708B0-7176-4C9D-A485-218706AF170A"}]}]}],"references":[{"url":"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg1JR50092","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg21679979","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/93817","source":"psirt@us.ibm.com"},{"url":"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg1JR50092","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg21679979","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/93817","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}