Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:hcltech:notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A110FE5-0ABF-454F-A239-370CDE59F615", "versionEndIncluding": "9.0.1", "versionStartIncluding": "9.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD81AC1C-2BA9-4688-A823-666C6558C3E2", "versionEndIncluding": "10.0.1", "versionStartIncluding": "10.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEA4FBF5-4DD8-465C-A43F-214F0A75FC54", "versionEndIncluding": "11.0.1", "versionStartIncluding": "11.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10:*:*:*:*:*:*", "matchCriteriaId": "2C984E7E-ADF7-4F52-9CE1-A6F1E05A4140", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if1:*:*:*:*:*:*", "matchCriteriaId": "DAD49650-9091-4706-9CAF-51BABDFB94CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if2:*:*:*:*:*:*", "matchCriteriaId": "6CE02BCC-5280-4065-8CD9-0BC2A2821335", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if3:*:*:*:*:*:*", "matchCriteriaId": "CF1C4C44-7B5E-4405-9F49-B85957E88760", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if4:*:*:*:*:*:*", "matchCriteriaId": "8CAA8D2D-7A27-49B5-87D2-740E6EB286A6", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if5:*:*:*:*:*:*", "matchCriteriaId": "A5778563-769B-40A2-8830-E64A5F18CE3C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if6:*:*:*:*:*:*", "matchCriteriaId": "6B69E327-0C81-4233-9791-DD50F66E9293", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp10if7:*:*:*:*:*:*", "matchCriteriaId": "331AD3B5-8D54-469A-873C-73AF93BC35DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp1if1:*:*:*:*:*:*", "matchCriteriaId": "2C8AF686-0BD4-4961-B924-481E328F67B7", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp1if2:*:*:*:*:*:*", "matchCriteriaId": "E035716B-05DD-4948-BD13-77F9CDA135E9", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp2if1:*:*:*:*:*:*", "matchCriteriaId": "35A89BAC-438D-4A9E-8FCD-B0D4CD03ED23", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp2if2:*:*:*:*:*:*", "matchCriteriaId": "98498BC3-0A35-446A-8BDC-562EF02E037E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp2if3:*:*:*:*:*:*", "matchCriteriaId": "D78AA096-1E76-4B24-B17D-9796E49B0D0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp2if4:*:*:*:*:*:*", "matchCriteriaId": "BB478F5B-E6C1-48B2-A0AB-25790E26272A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp3if1:*:*:*:*:*:*", "matchCriteriaId": "8041656D-55C6-4932-AA1F-77D9B1A22C80", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp3if2:*:*:*:*:*:*", "matchCriteriaId": "2266AD0F-D804-4BFC-B8E9-050F6AE6C9AA", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp3if3:*:*:*:*:*:*", "matchCriteriaId": "750709DB-28CC-49B2-98E4-0C4167705487", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp3if4:*:*:*:*:*:*", "matchCriteriaId": "96AD0DB0-75C7-4B2C-845C-AC7DE89A8F1E", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp4if1:*:*:*:*:*:*", "matchCriteriaId": "2815AB94-D387-4057-AAE9-39336CC4D871", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp4if2:*:*:*:*:*:*", "matchCriteriaId": "D19D5B99-E0BA-4E22-BA16-762114EFC89B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp5if1:*:*:*:*:*:*", "matchCriteriaId": "676D3DC9-FAE5-4E46-857B-B3AC5DCD70F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp5if2:*:*:*:*:*:*", "matchCriteriaId": "3BA224FC-B056-45F2-BF74-8B39F44FE522", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp5if3:*:*:*:*:*:*", "matchCriteriaId": "D3F6F4DA-EC68-42C2-93A1-99DBAC00F63B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp7if1:*:*:*:*:*:*", "matchCriteriaId": "3CB80E9D-E53D-4461-A71B-61A1615E9422", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp7if2:*:*:*:*:*:*", "matchCriteriaId": "1C65A591-435C-40D0-8512-AE3304AA948B", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp8if1:*:*:*:*:*:*", "matchCriteriaId": "3B3F9411-8D5B-43E5-9DA9-E0C615ED7557", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp9if1:*:*:*:*:*:*", "matchCriteriaId": "76E45481-36F9-4522-91A4-4D3FD9F6AB6C", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:9.0.1:fp9if2:*:*:*:*:*:*", "matchCriteriaId": "A177BC67-EBE8-4487-BC45-D42ED6AFA3B7", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:10.0.1:fp1:*:*:*:*:*:*", "matchCriteriaId": "E36EE406-5355-422B-B1AE-6349DCDBF872", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:10.0.1:fp2:*:*:*:*:*:*", "matchCriteriaId": "CFA1279C-D6E4-47D4-9D40-F39EC9C31E12", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:10.0.1:fp3:*:*:*:*:*:*", "matchCriteriaId": "4F0771C5-5F44-4563-BEFF-0DCEABE5452A", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:10.0.1:fp4:*:*:*:*:*:*", "matchCriteriaId": "980BB9E6-810B-4288-8667-0291BFFDCB9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:hcltech:notes:10.0.1:fp5:*:*:*:*:*:*", "matchCriteriaId": "8BECE3D7-F8C4-4065-8CCC-E9CF70CD6943", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "HCL Notes versions previous to releases 9.0.1 FP10 IF8, 10.0.1 FP6 and 11.0.1 FP1 is susceptible to a Stored Cross-site Scripting (XSS) vulnerability. An attacker could use this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials."}, {"lang": "es", "value": "HCL Notes versiones anteriores a 9.0.1 FP10 IF8, 10.0.1 FP6 y 11.0.1 FP1, son susceptibles a una vulnerabilidad de tipo Cross-site Scripting (XSS) almacenado. Un atacante podr\u00eda usar esta vulnerabilidad para ejecutar un script en el navegador Web de la v\u00edctima dentro del contexto de seguridad del sitio Web de alojamiento y/o robar unas credenciales de autenticaci\u00f3n basadas en cookies de la v\u00edctima"}], "id": "CVE-2020-14240", "lastModified": "2024-11-21T05:02:54.337", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-11-05T17:15:12.367", "references": [{"source": "psirt@hcl.com", "tags": ["Vendor Advisory"], "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0084789"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0084789"}], "sourceIdentifier": "psirt@hcl.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}