Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:websoft:websoft_hcm:2021.2.3.327:*:*:*:*:*:*:*", "matchCriteriaId": "390018F6-BE70-491B-85F9-04DC97EE7C5E", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an unauthenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Reflected XSS."}, {"lang": "es", "value": "El procesamiento insuficiente de la entrada del usuario en WebSoft HCM 2021.2.3.327 permite que un atacante no autenticado inyecte etiquetas HTML arbitrarias en la p\u00e1gina procesada por el navegador del usuario, incluidos scripts en el lenguaje de programaci\u00f3n JavaScript, lo que conduce a XSS reflejado."}], "id": "CVE-2022-46905", "lastModified": "2024-11-21T07:31:17.367", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-12-12T21:15:10.543", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://news.websoft.ru/_wt/wiki_base/7175852393019676262"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://news.websoft.ru/_wt/wiki_base/7175852393019676262"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}