CVE-2022-4396

Source
https://cve.org/CVERecord?id=CVE-2022-4396
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4396.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-4396
Aliases
Downstream
Published
2022-12-10T12:15:10.797Z
Modified
2026-03-13T14:53:57.564544Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function getoption of the file pyRdfa/init.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommended to apply a patch to fix this issue. The identifier VDB-215249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References

Affected packages

Git / github.com/rdflib/pyrdfa3

Affected ranges

Type
GIT
Repo
https://github.com/rdflib/pyrdfa3
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/rdflib/pyrdfa3
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*
3.5.0
3.5.1
3.5.2
Other
citable-release

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4396.json"