{"id":"CVE-2020-36608","details":"A vulnerability, which was classified as problematic, has been found in Tribal Systems Zenario CMS. Affected by this issue is some unknown functionality of the file admin_organizer.js of the component Error Log Module. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dfd0afacb26c3682a847bea7b49ea440b63f3baa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212816.","aliases":["GHSA-f92p-f8r2-c87q"],"modified":"2026-05-18T18:04:42.760398Z","published":"2022-11-02T19:15:09.807Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.212816"},{"type":"FIX","url":"https://github.com/TribalSystems/Zenario/commit/dfd0afacb26c3682a847bea7b49ea440b63f3baa"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tribalsystems/zenario","events":[{"introduced":"0"},{"fixed":"3ccfe04b62c138bf15026556749177b3e2b899e3"},{"fixed":"dfd0afacb26c3682a847bea7b49ea440b63f3baa"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"8.7"}],"cpe":"cpe:2.3:a:tribalsystems:zenario:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["8.6.51342","8.5.51340","8.4.50565","8.5.50837","8.5.50567","8.3.50564","8.3.48583","8.3.47997","8.2.47992","8.2.47369","8.2.47180","8.2.46614","8.0.45529","8.2.46436","8.1.46433","8.1.46089","8.1.45698","8.1.45530","7.7.44223","8.0.45250","8.0.45032","8.0.44521","8.0.44294","8.0.44273","8.0.44237","7.7.42990","7.7.42963","7.7.42682","7.6.42085","7.6.41633","7.6.41504","7.5.41499","7.5.41006","7.5.40440","7.5.0","7.4.4","7.4.3","7.2.3","7.4.2","7.4.1","7.4.0","7.3.0","7.1.2","7.2.2","7.0.7e","7.2.1","7.2.0","7.1.1","7.1.0","7.0.7d","7.0.7c","7.0.7b","7.0.7a","7.0.6b","7.0.4b","7.0.3a","7.0.2e","7.0.6a","7.0.5c","7.0.5b"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-36608.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}