{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:39:45.660","vulnerabilities":[{"cve":{"id":"CVE-2016-5761","sourceIdentifier":"security@opentext.com","published":"2017-04-20T17:59:00.460","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 allows remote attackers to inject arbitrary web script or HTML via a crafted email."},{"lang":"es","value":"Vulnerabilidad XSS en Novell GroupWise en versiones anteriores a 2014 R2 Service Pack 1 Hot Patch 1 permite a atacantes remotos inyectar secuencia de comandos web o HTML arbitrarios a través de un email manipulado."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:*:*:*:*:*:*:*:*","versionEndIncluding":"2012","matchCriteriaId":"4429E841-8575-4EDA-9F4A-B30DDBAAD71E"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:2014:-:*:*:*:*:*:*","matchCriteriaId":"95115533-262D-4715-A2DA-E2EB92C9225F"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:2014:r2:*:*:*:*:*:*","matchCriteriaId":"9EBA4CBE-AF05-43DE-9B90-77CDA36214AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:2014:sp1:*:*:*:*:*:*","matchCriteriaId":"66C8201A-7FF1-400A-8DB4-83EBF26E2543"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:2014:sp2:*:*:*:*:*:*","matchCriteriaId":"A4A863C3-76AC-4E1E-9CA6-18AE7E075712"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html","source":"security@opentext.com"},{"url":"http://seclists.org/fulldisclosure/2016/Aug/123","source":"security@opentext.com"},{"url":"http://www.securityfocus.com/archive/1/539296/100/0/threaded","source":"security@opentext.com"},{"url":"http://www.securityfocus.com/bid/92645","source":"security@opentext.com"},{"url":"https://www.novell.com/support/kb/doc.php?id=7017974","source":"security@opentext.com"},{"url":"https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt","source":"security@opentext.com"},{"url":"http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2016/Aug/123","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/539296/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/92645","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.novell.com/support/kb/doc.php?id=7017974","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}