{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4525","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2024-08-03T01:41:45.694Z","dateReserved":"2022-12-15T00:00:00.000Z","datePublished":"2022-12-15T00:00:00.000Z"},"containers":{"cna":{"title":"National Sleep Research Resource sleepdata.org cross site scripting","providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-24T21:17:44.485Z"},"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"National Sleep Research Resource","product":"sleepdata.org","versions":[{"version":"58.x","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in National Sleep Research Resource sleepdata.org up to 58.x and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 59.0.0.rc is able to address this issue. The name of the patch is da44a3893b407087829b006d09339780919714cd. It is recommended to upgrade the affected component. The identifier VDB-215905 was assigned to this vulnerability."},{"lang":"de","value":"In National Sleep Research Resource sleepdata.org bis 58.x wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Es geht um eine nicht näher bekannte Funktion. Durch Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 59.0.0.rc vermag dieses Problem zu lösen. Der Patch wird als da44a3893b407087829b006d09339780919714cd bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}}],"timeline":[{"time":"2022-12-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-24T17:45:51.000Z","lang":"en","value":"VulDB last update"}],"references":[{"url":"https://vuldb.com/?id.215905","tags":["technical-description","vdb-entry"]},{"url":"https://github.com/nsrr/sleepdata.org/commit/da44a3893b407087829b006d09339780919714cd","tags":["mitigation","patch"]},{"url":"https://github.com/nsrr/sleepdata.org/releases/tag/59.0.0.rc","tags":["mitigation"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:41:45.694Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.215905","tags":["technical-description","vdb-entry","x_transferred"]},{"url":"https://github.com/nsrr/sleepdata.org/commit/da44a3893b407087829b006d09339780919714cd","tags":["mitigation","patch","x_transferred"]},{"url":"https://github.com/nsrr/sleepdata.org/releases/tag/59.0.0.rc","tags":["mitigation","x_transferred"]}]}]}}