{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:26:35.325","vulnerabilities":[{"cve":{"id":"CVE-2016-9988","sourceIdentifier":"psirt@us.ibm.com","published":"2017-07-05T18:29:00.277","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Jazz Foundation Reporting Service (JRS) 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120554."},{"lang":"es","value":"IBM Jazz Foundation Reporting Service (JRS) versiones 5.0 y 6.0, es vulnerable a un problema de tipo cross-site scripting. Esta vulnerabilidad permite a los usuarios insertar código JavaScript arbitrario en la Interfaz de Usuario Web, y por lo tanto, alterar la funcionalidad deseada conllevando potencialmente a la divulgación de credenciales dentro de una sesión confiable. ID de IBM X-Force: 120554."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4D226029-A37F-486C-9DCD-1921671F242D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"83152595-8909-4AA4-A7D1-2E113A197B1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"103F9E24-E11F-4BAC-8EDB-86D332B9EC43"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*","matchCriteriaId":"07DD3FB3-ABE3-4645-9AFB-429EA4EA818D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"FF3780DD-9FAC-4850-AA83-DCA7D013FB3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"9FCC8D80-8974-41F7-8225-474A9814ABD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:jazz_reporting_service:6.0.3:*:*:*:*:*:*:*","matchCriteriaId":"3A3BEA54-9927-4117-8EB8-0D87A42198C2"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg22001007","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99353","source":"psirt@us.ibm.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/120554","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg22001007","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/99353","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/120554","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}