CVE-2022-3963

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-3963
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3963.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3963
Published
2022-11-12T22:15:09Z
Modified
2024-09-19T13:50:08.835314Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in gnuboard5. It has been classified as problematic. Affected is an unknown function of the file bbs/faq.php of the component FAQ Key ID Handler. The manipulation of the argument fm_id leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 5.5.8.2.1 is able to address this issue. The name of the patch is ba062ca5b62809106d5a2f7df942ffcb44ecb5a9. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213540.

References

Affected packages

Git / github.com/gnuboard/gnuboard5

Affected ranges

Type
GIT
Repo
https://github.com/gnuboard/gnuboard5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.0.1
5.0.10
5.0.11
5.0.12
5.0.13
5.0.14
5.0.15
5.0.16
5.0.17
5.0.18
5.0.2
5.0.20
5.0.21
5.0.22
5.0.23
5.0.24
5.0.25
5.0.26
5.0.27
5.0.28
5.0.29
5.0.3
5.0.30
5.0.31
5.0.32
5.0.33
5.0.34
5.0.35
5.0.36
5.0.37
5.0.38
5.0.39
5.0.4
5.0.41
5.0.42
5.0.5
5.0.8
5.0.9
5.1.0
5.1.1
5.1.10
5.1.11
5.1.12
5.1.13
5.1.14
5.1.15
5.1.16
5.1.17
5.1.18
5.1.19
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8
5.1.9
5.2.0
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.8
5.2.9
5.2.9.2
5.2.9.3
5.2.9.5
5.2.9.6
5.2.9.7
5.2.9.8
5.2.9.8.1
5.2.9.8.3
5.2.9.8.4
5.3.1
5.3.1.2
5.3.1.3
5.3.1.4
5.3.1.6
5.3.1.7
5.3.1.8
5.3.1.9
5.3.2.0
5.3.2.1
5.3.2.2
5.3.2.3
5.3.2.4
5.3.2.5
5.3.2.6
5.3.2.8
5.3.2.9
5.3.2.9.1
5.3.3
5.3.3.2
5.3.3.3
5.4.1
5.4.1.1
5.4.1.2
5.4.1.3
5.4.1.8
5.4.1.9
5.4.2
5.4.2.1
5.4.2.2
5.4.2.3
5.4.2.4
5.4.2.5
5.4.2.6
5.4.2.7
5.4.2.8
5.4.2.9
5.4.3
5.4.3.1
5.4.4
5.4.4.1
5.4.4.2
5.4.4.3
5.4.4.4
5.4.4.5
5.4.4.6
5.4.4.7
5.4.4.7.1
5.4.4.8
5.4.4.9
5.4.5
5.4.5.1
5.4.5.2
5.4.6

v5.*

v5.4.10
v5.4.11
v5.4.12
v5.4.13
v5.4.13.1
v5.4.14
v5.4.15
v5.4.15.1
v5.4.16
v5.4.17
v5.4.18
v5.4.18.1
v5.4.19
v5.4.20
v5.4.21
v5.4.22
v5.4.7
v5.4.8
v5.4.9
v5.5.0-beta
v5.5.0.1-beta
v5.5.0.2-beta
v5.5.1
v5.5.1-beta
v5.5.2
v5.5.3
v5.5.3.1
v5.5.4
v5.5.5
v5.5.6
v5.5.7
v5.5.7.1
v5.5.7.2
v5.5.7.3
v5.5.7.4
v5.5.8
v5.5.8.1
v5.5.8.1.1
v5.5.8.1.2
v5.5.8.2