{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:30:41.292","vulnerabilities":[{"cve":{"id":"CVE-2020-22723","sourceIdentifier":"cve@mitre.org","published":"2020-11-18T22:15:11.823","lastModified":"2024-11-21T05:13:23.380","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address."},{"lang":"es","value":"Una vulnerabilidad de tipo cross-site scripting (XSS) en Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop versión 1.14, permite a atacantes remotos inyectar script web o HTML arbitrario por medio del archivo user.php al registrar una cuenta directamente en el centro de usuarios y luego agregar la carga útil en la dirección de entrega"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ljcmsshop_project:ljcmsshop:1.14:*:*:*:*:*:*:*","matchCriteriaId":"B34E3238-47FA-431C-8B38-60C5AA072F82"}]}]}],"references":[{"url":"https://baijiahao.baidu.com/s?id=1653681087434824406&wfr=spider&for=pc","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.freebuf.com/articles/web/192318.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://baijiahao.baidu.com/s?id=1653681087434824406&wfr=spider&for=pc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.freebuf.com/articles/web/192318.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}