{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:28:07.036","vulnerabilities":[{"cve":{"id":"CVE-2016-0282","sourceIdentifier":"psirt@us.ibm.com","published":"2016-11-24T19:59:03.707","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in IBM iNotes before 8.5.3 FP6 IF2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, aka SPR KLYHAAHNUS."},{"lang":"es","value":"Vulnerabilidad de XSS en IBM iNotes en versiones anteriores a 8.5.3 FP6 IF2 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través de una URL manipulada, vulnerabilidad también conocida como SPR KLYHAAHNUS."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"FF04F0F8-E2AC-4080-91CE-E871CF32FBB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"8865EB47-3C1B-485B-94CA-852F1C40FDE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*","matchCriteriaId":"7FA02A70-D433-4AEB-B7CD-77744E52D280"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"84F5294B-DAEF-4450-81C1-AEB951364336"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"0EF658AD-31D5-4A88-920E-98B722D48355"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.1.3:*:*:*:*:*:*:*","matchCriteriaId":"C029E446-2BBA-491D-9AA0-D83A3879CCBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.1.4:*:*:*:*:*:*:*","matchCriteriaId":"618F1C0E-8E43-4D63-A497-9FFEE4E3A90D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.1.5:*:*:*:*:*:*:*","matchCriteriaId":"53A4CC23-6053-40FC-BFC8-08FAA9F0AE53"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*","matchCriteriaId":"CA621B45-7747-491D-A983-DD125BEE2753"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"DA57E455-B3CB-4F53-854B-21D8DFB95ED1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.2.2:*:*:*:*:*:*:*","matchCriteriaId":"96E0153C-BDC4-4D01-A292-AD97A5C168EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.2.3:*:*:*:*:*:*:*","matchCriteriaId":"A4ED4C08-82E5-4165-A585-E23E23015609"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.2.4:*:*:*:*:*:*:*","matchCriteriaId":"56D81A39-EA3A-4440-B026-8E8A4506C65D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*","matchCriteriaId":"76D0D493-1BFD-4054-BDB0-F338BFAFDC5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"F088F719-F4BE-4B49-B022-96D43664155B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.2:*:*:*:*:*:*:*","matchCriteriaId":"B7F797B7-C3EA-4A12-8D69-217FBD4B9EB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.3:*:*:*:*:*:*:*","matchCriteriaId":"AFCA4DA1-302C-42AD-9317-DC733A17696B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.4:*:*:*:*:*:*:*","matchCriteriaId":"B102407C-3CCE-45A5-A3A2-9C24D5F4866A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.5:*:*:*:*:*:*:*","matchCriteriaId":"577AA3FA-31BA-429C-8CE6-B3776F5CF857"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_inotes:8.5.3.6:*:*:*:*:*:*:*","matchCriteriaId":"6A01616C-AEEB-40A0-AB35-0F615ADF8ADC"}]}]}],"references":[{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21991722","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94558","source":"psirt@us.ibm.com"},{"url":"http://www.securitytracker.com/id/1037383","source":"psirt@us.ibm.com"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21991722","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94558","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1037383","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}