{"containers":{"cna":{"affected":[{"product":"Dradis Community Edition and Dradis Professional Edition","vendor":"Security Roots Ltd","versions":[{"status":"affected","version":"Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier"}]}],"datePublic":"2019-03-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors."}],"problemTypes":[{"descriptions":[{"description":"Cross-site scripting","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-03-12T20:57:01.000Z","orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert"},"references":[{"name":"JVN#40288903","tags":["third-party-advisory","x_refsource_JVN"],"url":"http://jvn.jp/en/jp/JVN40288903/index.html"},{"tags":["x_refsource_MISC"],"url":"https://dradisframework.com/ce/security_reports.html#fixed-3.11.1"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2019-5925","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Dradis Community Edition and Dradis Professional Edition","version":{"version_data":[{"version_value":"Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier"}]}}]},"vendor_name":"Security Roots Ltd"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Cross-site scripting"}]}]},"references":{"reference_data":[{"name":"JVN#40288903","refsource":"JVN","url":"http://jvn.jp/en/jp/JVN40288903/index.html"},{"name":"https://dradisframework.com/ce/security_reports.html#fixed-3.11.1","refsource":"MISC","url":"https://dradisframework.com/ce/security_reports.html#fixed-3.11.1"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T20:09:23.796Z"},"title":"CVE Program Container","references":[{"name":"JVN#40288903","tags":["third-party-advisory","x_refsource_JVN","x_transferred"],"url":"http://jvn.jp/en/jp/JVN40288903/index.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://dradisframework.com/ce/security_reports.html#fixed-3.11.1"}]}]},"cveMetadata":{"assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","cveId":"CVE-2019-5925","datePublished":"2019-03-12T21:00:00.000Z","dateReserved":"2019-01-10T00:00:00.000Z","dateUpdated":"2024-08-04T20:09:23.796Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}