Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F356136-5E64-43D5-94D2-A08934DEBD1C", "versionEndIncluding": "8.7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "FBAC9796-BA52-48AF-9326-3C2343BE2342", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D705DD1-8F24-49B4-8D05-F0403A625016", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D66B990-2034-46D9-AF8D-DE69B3161F38", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1a:*:*:*:*:*:*:*", "matchCriteriaId": "50EC1311-629F-401B-9AE3-8ECDE0CBF330", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AFA47D5-AC5B-4A1B-83A6-EE5D49ECE489", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2a:*:*:*:*:*:*:*", "matchCriteriaId": "F5FE2E49-88CF-4D61-8097-B3146A47BAED", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Web UI in the web portal in IBM Tealeaf Customer Experience before 8.7.1.8847 FP10, 8.8 before 8.8.0.9049 FP9, 9.0.0 and 9.0.1 before 9.0.1.1117 FP5, 9.0.1A before 9.0.1.5108_9.0.1A FP5, 9.0.2 before 9.0.2.1223 FP3, and 9.0.2A before 9.0.2.5224_9.0.2A FP3 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string, a different vulnerability than CVE-2016-5978."}, {"lang": "es", "value": "Vulnerabilidad de XSS en la Web UI en el portal web en IBM Tealeaf Customer Experience en versiones anteriores a 8.7.1.8847 FP10, 8.8 en versiones anteriores a 8.8.0.9049 FP9, 9.0.0 y 9.0.1 en versiones anteriores a 9.0.1.1117 FP5, 9.0.1A en versiones anteriores a 9.0.1.5108_9.0.1A FP5, 9.0.2 en versiones anteriores a 9.0.2.1223 FP3 y 9.0.2A en versiones anteriores a 9.0.2.5224_9.0.2A FP3 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una cadena embebida, una vulnerabilidad diferente a CVE-2016-5978."}], "id": "CVE-2016-5975", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2016-09-26T04:59:30.267", "references": [{"source": "psirt@us.ibm.com", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21990216"}, {"source": "psirt@us.ibm.com", "url": "http://www.securityfocus.com/bid/93135"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21990216"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/93135"}], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}