{"id":"CVE-2022-40704","details":"A XSS vulnerability was found in phoromatic_r_add_test_details.php in phoronix-test-suite.","modified":"2026-04-16T00:06:06.523621188Z","published":"2023-01-17T19:15:11.530Z","related":["openSUSE-SU-2024:12555-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"fixed":"2022-07-23"}],"cpe":"cpe:2.3:a:phoronix-media:phoronix_test_suite:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"FIX","url":"https://github.com/phoronix-test-suite/phoronix-test-suite/commit/d3880d9d3ba795138444da83f1153c3c3ac27640"},{"type":"FIX","url":"https://github.com/phoronix-test-suite/phoronix-test-suite/issues/650"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phoronix-test-suite/phoronix-test-suite","events":[{"introduced":"0"},{"fixed":"d3880d9d3ba795138444da83f1153c3c3ac27640"}],"database_specific":{"source":"REFERENCES"}}],"versions":["v.7.8.0","v10.0.0","v10.0.0m1","v10.0.0m2","v10.0.0m3","v10.0.1","v10.2.0","v10.2.0m1","v10.2.0m2","v10.2.0m3","v10.2.1","v10.2.2","v10.4.0","v10.4.0m1","v10.6.1","v10.8.0","v10.8.1","v10.8.2","v10.8.3","v10.8.4","v5.0.1","v5.2.0","v5.2.0m2","v5.2.0m3","v5.2.0m4","v5.2.1","v5.4.0","v5.4.0m2","v5.4.0m3","v5.4.1","v5.6.0","v5.8.0","v5.8.1","v6.0","v6.0.1","v6.2.0","v6.2.1","v6.2.2","v6.4.0","v6.6.0","v6.6.1","v6.8.0","v7.0.0","v7.0.1","v7.2.0","v7.2.1","v7.4.0","v7.6.0","v7.8.0","v8.0.0","v8.0.0m3","v8.0.0m4","v8.0.0m5","v8.0.1","v8.2.0","v8.2.0m1","v8.2.0m2","v8.2.0m4","v8.4.0","v8.4.0m1","v8.4.0m2","v8.4.0m3","v8.4.1","v8.6.0","v8.6.0m1","v8.6.0m2","v8.6.0m3","v8.6.1","v8.8.0","v8.8.0m1","v8.8.0m2","v8.8.0m3","v8.8.1","v9.0.0","v9.0.0m1","v9.0.0m2","v9.0.0m3","v9.0.1","v9.2.0","v9.2.0m1","v9.2.0m2","v9.4.0","v9.4.0m1","v9.4.0m2","v9.4.0m3","v9.4.1","v9.6.0","v9.6.0m1","v9.6.0m2","v9.6.0m3","v9.6.1","v9.8.0","v9.8.0m1","v9.8.0m2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40704.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}