Vulnerability Details : CVE-2022-35229

An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
Vulnerability category: Cross site scripting (XSS)Cross-site request forgery (CSRF)
Published 2022-07-06 11:15:09
Updated 2023-08-22 19:16:23
Source Zabbix
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2022-35229

Probability of exploitation activity in the next 30 days: 0.06%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 25 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2022-35229

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
3.5
LOW AV:N/AC:M/Au:S/C:N/I:P/A:N
6.8
2.9
[email protected]
5.4
MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
2.3
2.7
[email protected]
3.7
LOW CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
1.2
2.5
[email protected]

CWE ids for CVE-2022-35229

References for CVE-2022-35229

Products affected by CVE-2022-35229

This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!