{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T19:52:04.785","vulnerabilities":[{"cve":{"id":"CVE-2022-23165","sourceIdentifier":"cna@cyber.gov.il","published":"2022-05-12T20:15:15.240","lastModified":"2024-11-21T06:48:06.810","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sysaid – Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter \"helpPageName\" used by the page \"/help/treecontent.jsp\" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system"},{"lang":"es","value":"Sysaid - Sysaid versión 14.2.0 Cross-Site Scripting (XSS) Reflejado - El parámetro \"helpPageName\" usado por la página \"/help/treecontent.jsp\" sufre una vulnerabilidad de tipo Cross-Site Scripting Reflejado. Para que un atacante pueda explotar esta vulnerabilidad de tipo Cross-Site Scripting, es necesario que el producto afectado exponga las páginas de ayuda sin conexión. Un atacante podría conseguir acceso a información confidencial o ejecutar código del lado del cliente en la sesión del navegador del usuario víctima. Además, un atacante requeriría que la víctima abriera un enlace malicioso. Un atacante puede explotar esta vulnerabilidad para llevar a cabo ataques de phishing. El atacante puede recibir datos confidenciales como detalles del servidor, nombres de usuario, estaciones de trabajo, etc. También puede llevar a cabo acciones como la carga de archivos, la eliminación de llamadas del sistema"}],"metrics":{"cvssMetricV31":[{"source":"cna@cyber.gov.il","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.8,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"cna@cyber.gov.il","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*","versionEndExcluding":"22.1.64","matchCriteriaId":"2705AD15-BD6F-4F05-8826-894DA3428679"},{"vulnerable":true,"criteria":"cpe:2.3:a:sysaid:sysaid:*:*:*:*:cloud:*:*:*","versionEndExcluding":"22.2.20","matchCriteriaId":"1421E8E9-535B-483B-93AB-49D244550327"}]}]}],"references":[{"url":"https://www.gov.il/en/departments/faq/cve_advisories","source":"cna@cyber.gov.il","tags":["Third Party Advisory"]},{"url":"https://www.gov.il/en/departments/faq/cve_advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}