cvelist/2022/29xxx/CVE-2022-29540.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2022-04-20 23:01:24 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-06-02 13:43:42 +00:00
"ID": "CVE-2022-29540",
"STATE": "PUBLIC"
2022-04-20 23:01:24 +00:00
},
2022-06-02 13:43:42 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-04-20 23:01:24 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-06-02 13:43:42 +00:00
"value": "resi-calltrace in RESI Gemini-Net 4.2 is affected by Multiple XSS issues. Unauthenticated remote attackers can inject arbitrary web script or HTML into an HTTP GET parameter that reflects user input without sanitization. This exists on numerous application endpoints,"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.gruppotim.it/it/footer/red-team.html",
"url": "https://www.gruppotim.it/it/footer/red-team.html"
},
{
"url": "https://www.resi.it/prodotti-soluzioni-commerciali/gemini-network-service-monitoring",
"refsource": "MISC",
"name": "https://www.resi.it/prodotti-soluzioni-commerciali/gemini-network-service-monitoring"
2022-04-20 23:01:24 +00:00
}
]
}
}