Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7048 | Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings are properly escaped when rendered. |
Github GHSA |
GHSA-7pfc-cc9x-8p4m | Apache Isis Cross-site Scripting vulnerability |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-08T19:54:09.104Z
Reserved: 2022-10-07T00:00:00.000Z
Link: CVE-2022-42466
Updated: 2024-08-03T13:10:40.438Z
Status : Modified
Published: 2022-10-19T08:15:11.340
Modified: 2025-05-08T20:15:22.127
Link: CVE-2022-42466
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA