IBM Security Bulletin: IBM Resilient – Cross Site Scripting Vulnerability (CVE-2016-6062)

Share this post:

IBM Resilient is vulnerable to cross-site scripting.

CVE(s): CVE-2016-6062

Affected product(s) and affected version(s):

All versions of IBM Resilient prior to v26.3 are vulnerable to this defect.

Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://success.resilientsystems.com/hc/en-us/articles/213457065-Security-Bulletin-IBM-Resilient-Cross-Site-Scripting-Vulnerability-CVE-2016-6062-
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/117235

More stories

IBM Addresses Reported Intel Security Vulnerabilities

May 20, 2019 4:34 pm EDT

In May 2019, Microarchitectural Data Sampling (MDS) side channel attack variants were disclosed (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091). These security vulnerabilities made public by Intel have the potential to allow an attacker running code on the same physical CPU to read other data being processed by that CPU. There are no known exploits at this ...read more


Potential Impact on Processors in the POWER Family

May 14, 2019 6:30 pm EDT

In January 2018, three security vulnerabilities were made public that allow unauthorized users to bypass the hardware barrier between applications and kernel memory. These vulnerabilities all make use of speculative execution to perform side-channel information disclosure attacks. The first two vulnerabilities, CVE-2017-5753 and CVE-2017- 5715, are collectively known as Spectre, and allow user-level code to ...read more


IBM Product Security Incident Response

Acknowledgement

Feb 27, 2019 3:40 pm EDT

IBM acknowledges and thanks the security researchers and organizations listed below for reporting and working with us to resolve one or more security vulnerabilities in our products and services. Disclosures for 2019 Neil Kettle, (Trustwave) Steve Petz   Disclosures for 2018 Artem Metla Cody Wass, (NetSPI) David Azria, Alex Mor, (Ernst & Young, Hacktics Advanced ...read more