Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-27546

Опубликовано: 29 авг. 2022
Источник: nvd
CVSS3: 8.3
CVSS3: 6.1
EPSS Низкий

Описание

HCL iNotes is susceptible to a Reflected Cross-site Scripting (XSS) vulnerability caused by improper validation of user-supplied input supplied with a form POST request. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's web browser within the security context of the hosting web site and/or steal the victim's cookie-based authentication credentials.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:hcltech:hcl_inotes:9.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_10:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_3:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_4:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_5:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_6:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_7:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_8:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_9:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_1:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_2:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_3:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_4:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_5:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_6:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_7:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_8:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_1:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_2:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_3:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_4:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_5:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:12.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:12.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:hcl_inotes:12.0.1:fixpack_1:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:hcltech:domino:9.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_10:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_3:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_4:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_5:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_6:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_7:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_8:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:9.0.1:fixpack_9:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_1:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_2:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_3:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_4:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_5:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_6:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_7:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:10.0.1:fixpack_8:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0.1:fixpack_1:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0.1:fixpack_2:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0.1:fixpack_3:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0.1:fixpack_4:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:11.0.1:fixpack_5:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:12.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:12.0.1:-:*:*:*:*:*:*
cpe:2.3:a:hcltech:domino:12.0.1:fixpack_1:*:*:*:*:*:*

EPSS

Процентиль: 46%
0.00236
Низкий

8.3 High

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79

Связанные уязвимости

CVSS3: 6.1
github
больше 3 лет назад

HCL iNotes is susceptible to a Reflected Cross-site Scripting (XSS) vulnerability caused by improper validation of user-supplied input supplied with a form POST request. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's web browser within the security context of the hosting web site and/or steal the victim's cookie-based authentication credentials.

EPSS

Процентиль: 46%
0.00236
Низкий

8.3 High

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-79
CWE-79