Cross-site scripting (XSS) vulnerability in the Process Portal in IBM Business Process Manager 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2014-8913.
References
Link | Resource |
---|---|
http://secunia.com/advisories/62205 | |
http://www-01.ibm.com/support/docview.wss?uid=swg1JR51836 | Patch Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1JR52103 | Patch Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21693239 | Patch Vendor Advisory |
http://www.securitytracker.com/id/1031614 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99285 | |
http://secunia.com/advisories/62205 | |
http://www-01.ibm.com/support/docview.wss?uid=swg1JR51836 | Patch Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1JR52103 | Patch Vendor Advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21693239 | Patch Vendor Advisory |
http://www.securitytracker.com/id/1031614 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99285 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/62205 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1JR51836 - Patch, Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1JR52103 - Patch, Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21693239 - Patch, Vendor Advisory | |
References | () http://www.securitytracker.com/id/1031614 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/99285 - |
Information
Published : 2015-01-21 15:17
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8914
Mitre link : CVE-2014-8914
CVE.ORG link : CVE-2014-8914
JSON object : View
Products Affected
ibm
- business_process_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')