{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:07:04.950546500Z","vulnerabilities":[{"cve":{"id":"CVE-2017-1551","sourceIdentifier":"psirt@us.ibm.com","published":"2017-09-25T16:29:00.413","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IBM API Connect 5.0.0.0 through 5.0.7.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 131291."},{"lang":"es","value":"IBM API Connect desde la versión 5.0.0.0 hasta la 5.0.7.2 podría permitir que un atacante remoto secuestre la acción de clicado de la víctima. Al persuadir a una víctima para que visite un sitio web malicioso, un atacante remoto podría explotar esta vulnerabilidad para secuestrar las acciones de clicado de la víctima y, probablemente, lanzar más ataques contra la víctima. IBM X-Force ID: 131291."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"6B43F8D4-A60E-4C56-B868-8616958A0B74"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.0.1:*:*:*:*:*:*:*","matchCriteriaId":"39A4F3B4-A3D8-4281-BBB1-8B95297657F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"4049722A-338F-49FA-A9B2-2A432F04D2A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.2.0:*:*:*:*:*:*:*","matchCriteriaId":"4C12F86C-FBDF-4231-B4EA-4279FC730088"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBC9AEC-CD8B-4F2A-99A7-469B93107B9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.4.0:*:*:*:*:*:*:*","matchCriteriaId":"BBB03CE4-C3EE-41E9-9321-9AB9829FDB5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.5.0:*:*:*:*:*:*:*","matchCriteriaId":"C7B9AC88-C53D-4810-B21E-7A836524859B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.6.0:*:*:*:*:*:*:*","matchCriteriaId":"8D8AD67C-0221-4EF1-B0A2-C13CEE62D27F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.6.1:*:*:*:*:*:*:*","matchCriteriaId":"61864755-C7B6-416C-9D3E-334AB3D94825"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.6.2:*:*:*:*:*:*:*","matchCriteriaId":"7FCB9030-50A4-4B9B-8457-9DB9E13B3211"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.6.3:*:*:*:*:*:*:*","matchCriteriaId":"4E2679C4-FF15-4FB5-A6D6-11229AB5EFF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.6.4:*:*:*:*:*:*:*","matchCriteriaId":"E7BB28DE-AF37-4444-8BA5-9928072C2F6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.7.0:*:*:*:*:*:*:*","matchCriteriaId":"336EC55F-E19B-4D26-8AEA-40DC40F6C0A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.7.1:*:*:*:*:*:*:*","matchCriteriaId":"FBB6EF04-A24E-4857-8C7A-DE779AFA8B70"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:api_connect:5.0.7.2:*:*:*:*:*:*:*","matchCriteriaId":"6C6AFDC6-3596-4640-8E92-984B308A1C75"}]}]}],"references":[{"url":"http://www.ibm.com/support/docview.wss?uid=swg22008372","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/131291","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"http://www.ibm.com/support/docview.wss?uid=swg22008372","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/131291","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]}]}}]}