{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T10:04:01.051","vulnerabilities":[{"cve":{"id":"CVE-2016-8953","sourceIdentifier":"psirt@us.ibm.com","published":"2017-07-12T17:29:00.373","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Emptoris Sourcing 9.5.x through 10.1.x could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 118840."},{"lang":"es","value":"IBM Emptoris Sourcing versión 9.5.x hasta 10.1.x, podría permitir a un atacante remoto realizar ataques de phishing, usando un ataque de redireccionamiento abierto. Mediante la persuasión a una víctima para que visite un sitio web especialmente creado, un atacante remoto podría aprovechar esta vulnerabilidad para falsificar la URL desplegada y redireccionar a un usuario hacia un sitio web malicioso que parece ser de confianza. Esto podría permitir al atacante obtener información altamente confidencial o conducir nuevos ataques contra la víctima. ID de IBM X-Force: 118840."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:N","baseScore":4.9,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:9.5:*:*:*:*:*:*:*","matchCriteriaId":"3A510872-DA85-4041-9D82-94FE64135F7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:9.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"970BBAEB-9B4E-4E99-A1A6-DB1DEA30B3ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"4A8EEB27-C73B-403F-BD6C-012DA02614D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"BF0C51A9-6ED2-43E1-A3AA-88B7EA4EC6B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.3:*:*:*:*:*:*:*","matchCriteriaId":"17BDB2B8-AC6D-4811-B889-F06345EABF7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"524A7263-139E-4A65-85FB-CF4EFD18740A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:10.0.1:*:*:*:*:*:*:*","matchCriteriaId":"349341EF-A838-4642-A8E3-8BD3FDCD1AD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:10.0.2:*:*:*:*:*:*:*","matchCriteriaId":"7DF61E42-8D4A-4A82-807D-A27E1E38F2BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:10.0.4:*:*:*:*:*:*:*","matchCriteriaId":"54A28E28-899C-493A-AE8E-202CEE03881D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:10.1.0:*:*:*:*:*:*:*","matchCriteriaId":"811C5D4F-9A96-416A-84B6-EA3AEFE03173"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:emptoris_sourcing:10.1.1:*:*:*:*:*:*:*","matchCriteriaId":"0E566623-639E-4A38-95A9-4A6951D31EF6"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg22005549","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99545","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/118840","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg22005549","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99545","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/118840","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]}]}}]}