Show plain JSON{"id": "CVE-2014-8893", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2015-01-29T01:59:00.060", "references": [{"url": "http://secunia.com/advisories/62674", "source": "psirt@us.ibm.com"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694767", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99012", "source": "psirt@us.ibm.com"}, {"url": "http://secunia.com/advisories/62674", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694767", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99012", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en (1) mainpage.jsp y (2) GetImageServlet.img en IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 anterior a 3.3.2.3, y 3.4.1 anterior a 3.4.1.1 permiten a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una URL manipulada."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46D0A920-F5D2-4FB7-8EF1-E892B27F3158"}, {"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "110B75DA-3B5D-4B2A-A243-C02F04A69DD8"}, {"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CFF6D9D-633A-414B-9A81-9627F1006F99"}, {"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97EB5F4E-24BB-4F17-80B1-963DBC66E44D"}, {"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC985F26-E915-49CA-951A-7E3FE59E5377"}, {"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4271E1DA-B047-4C91-93D6-EF5A9EE9AC51"}, {"criteria": "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27D8FE59-90C3-4EE3-BA70-01C71DCC27B0"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@us.ibm.com"}