{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T02:27:09.200","vulnerabilities":[{"cve":{"id":"CVE-2020-14225","sourceIdentifier":"psirt@hcl.com","published":"2020-12-21T18:15:14.383","lastModified":"2024-11-21T05:02:53.783","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HCL iNotes is susceptible to a Tabnabbing vulnerability caused by improper sanitization of message content. A remote unauthenticated attacker could use this vulnerability to trick the end user into entering sensitive information such as credentials, e.g. as part of a phishing attack."},{"lang":"es","value":"HCL iNotes es susceptible a una vulnerabilidad de tipo Tabnabbing causada por un saneamiento inapropiado del contenido del mensaje.&#xa0;Un atacante no autenticado remoto podría usar esta vulnerabilidad para engañar al usuario final para que ingrese información confidencial, tales como credenciales, por ejemplo, como parte de un ataque de phishing"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:-:*:*:*:*:*:*","matchCriteriaId":"6DB5111E-B70F-475F-A23D-DF08FD1AB97E"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack1:*:*:*:*:*:*","matchCriteriaId":"7AA0BE4B-C5B2-4F0A-AE23-25032CC7C2E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack2:*:*:*:*:*:*","matchCriteriaId":"AE8447C7-B040-461A-88AD-C407A3867928"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack3:*:*:*:*:*:*","matchCriteriaId":"080E290A-A18E-45A6-9039-369763AC27CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack4:*:*:*:*:*:*","matchCriteriaId":"EE08595A-7384-4DED-854F-B28C4C431FEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:hcl_inotes:11.0.0:*:*:*:*:*:*:*","matchCriteriaId":"63B76DD1-79D7-4320-A1E8-7B5BF5345B3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltechsw:hcl_inotes:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.1","matchCriteriaId":"5BAF9E37-610E-4E7C-A1D9-ADA85818DBC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltechsw:hcl_inotes:9.0.1:fixpack_8:*:*:*:*:*:*","matchCriteriaId":"E43BA08A-3541-4F11-A5D4-2D2E5A775D66"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltechsw:hcl_inotes:9.0.1:fixpack_9:*:*:*:*:*:*","matchCriteriaId":"DD04A768-66DA-42B6-82AE-0DEDB8E9DB31"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltechsw:hcl_inotes:9.0.1:fixpack_9_interim_fix_1:*:*:*:*:*:*","matchCriteriaId":"419B397B-51F7-4C6A-A824-8082219850F6"}]}]}],"references":[{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085915","source":"psirt@hcl.com","tags":["Vendor Advisory"]},{"url":"https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085915","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}