Логотип exploitDog
bind:CVE-2022-0473
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-0473

Количество 3

Количество 3

ubuntu логотип

CVE-2022-0473

около 4 лет назад

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

CVSS3: 3.8
EPSS: Низкий
nvd логотип

CVE-2022-0473

около 4 лет назад

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-j2qj-f5h6-7m56

около 4 лет назад

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-0473

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

CVSS3: 3.8
1%
Низкий
около 4 лет назад
nvd логотип
CVE-2022-0473

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

CVSS3: 3.8
1%
Низкий
около 4 лет назад
github логотип
GHSA-j2qj-f5h6-7m56

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

1%
Низкий
около 4 лет назад

Уязвимостей на страницу