Files
CVEs-PoC/2016/CVE-2016-5980.md
T
2025-09-29 21:09:30 +02:00

34 lines
2.1 KiB
Markdown

### [CVE-2016-5980](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5980)
![](https://img.shields.io/static/v1?label=Product&message=TRIRIGA%20Application%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.3.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.3.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.4.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.4.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.5.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brightgreen)
### Description
IBM TRIRIGA Application Platform is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
### POC
#### Reference
- http://www.ibm.com/support/docview.wss?uid=swg21991992
#### Github
No PoCs found on GitHub currently.