{"id":"CVE-2022-4588","details":"A vulnerability, which was classified as problematic, was found in Boston Sleep slice up to 84.1.x. Affected is an unknown function of the component Layout Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 84.2.0 is able to address this issue. The name of the patch is 6523bb17d889e2ab13d767f38afefdb37083f1d0. It is recommended to upgrade the affected component. VDB-216174 is the identifier assigned to this vulnerability.","modified":"2026-04-12T04:18:24.196367Z","published":"2022-12-17T13:15:09.807Z","references":[{"type":"ADVISORY","url":"https://github.com/sleepepi/slice/releases/tag/v84.2.0"},{"type":"ADVISORY","url":"https://vuldb.com/?id.216174"},{"type":"FIX","url":"https://github.com/sleepepi/slice/commit/6523bb17d889e2ab13d767f38afefdb37083f1d0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sleepepi/slice","events":[{"introduced":"0"},{"fixed":"7f1eec7213835561579da57cccfbc4289d7c1fda"},{"fixed":"6523bb17d889e2ab13d767f38afefdb37083f1d0"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"84.2.0"}],"source":["CPE_FIELD","REFERENCES"],"cpe":"cpe:2.3:a:bostonsleep:slice:*:*:*:*:*:*:*:*"}}],"versions":["v0.1.0","v0.10.0","v0.10.1","v0.10.2","v0.10.3","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.11.4","v0.11.5","v0.11.6","v0.11.7","v0.11.8","v0.11.9","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.13.1","v0.14.0","v0.14.1","v0.14.2","v0.14.3","v0.14.4","v0.15.0","v0.15.2","v0.16.0","v0.17.0","v0.18.0","v0.18.1","v0.18.2","v0.18.3","v0.19.0","v0.2.0","v0.2.1","v0.20.0","v0.20.1","v0.20.2","v0.20.3","v0.20.4","v0.20.5","v0.20.6","v0.20.7","v0.21.0","v0.21.1","v0.21.2","v0.21.3","v0.22.0","v0.22.1","v0.22.2","v0.22.3","v0.22.4","v0.22.5","v0.22.6","v0.22.7","v0.23.0","v0.23.1","v0.23.2","v0.23.3","v0.23.4","v0.23.5","v0.23.6","v0.24.0","v0.24.1","v0.24.10","v0.24.11","v0.24.12","v0.24.13","v0.24.2","v0.24.3","v0.24.4","v0.24.5","v0.24.6","v0.24.7","v0.24.8","v0.24.9","v0.25.0","v0.25.1","v0.26.0","v0.26.1","v0.26.2","v0.26.3","v0.27.0","v0.27.1","v0.27.2","v0.27.3","v0.27.4","v0.27.5","v0.27.6","v0.27.7","v0.28.0","v0.28.1","v0.29.0","v0.29.0.beta1","v0.29.0.beta2","v0.29.0.beta3","v0.29.0.rc","v0.29.1","v0.29.1.rc","v0.3.0","v0.3.1","v0.30.0","v0.30.0.beta1","v0.30.0.rc","v0.30.1","v0.30.2","v0.30.3","v0.31.0","v0.32.0","v0.32.1","v0.32.2","v0.33.0","v0.33.1","v0.33.2","v0.33.3","v0.34.0","v0.34.0.rc","v0.34.0.rc2","v0.34.1","v0.35.0","v0.36.0.rc","v0.36.0.rc2","v0.4.0","v0.4.1","v0.40.0","v0.40.0.rc","v0.41.0","v0.41.0.beta1","v0.41.0.beta2","v0.41.0.beta3","v0.41.0.beta4","v0.41.0.beta5","v0.41.0.beta6","v0.41.0.beta7","v0.41.0.rc","v0.42.0.beta1","v0.42.0.beta2","v0.42.0.beta3","v0.42.0.rc","v0.42.0.rc2","v0.43.0","v0.43.0.rc","v0.44.0","v0.44.0.rc","v0.45.0","v0.45.0.rc","v0.46.0","v0.46.0.beta1","v0.46.0.rc","v0.46.1","v0.46.2","v0.47.0","v0.47.0.rc","v0.47.1","v0.48.0","v0.48.0.rc","v0.49.0","v0.49.0.rc","v0.49.0.rc2","v0.5.0","v0.53.0","v0.53.0.beta1","v0.53.0.rc","v0.54.0","v0.54.0.beta1","v0.54.0.rc","v0.54.0.rc2","v0.54.1","v0.55.0","v0.56.0","v0.56.0.rc","v0.56.1","v0.57.0","v0.57.1","v0.6.0","v0.7.0","v0.8.0","v0.9.0","v0.9.1","v58.0.0","v58.1.0","v59.0.0","v59.0.0.beta1","v59.0.0.beta2","v59.0.0.rc","v59.0.0.rc2","v59.0.0.rc3","v59.1.0","v59.1.1","v60.0.0.beta1","v60.0.0.beta2","v60.0.0.beta3","v61.0.0","v61.0.0.beta1","v61.0.0.beta2","v61.0.0.rc","v62.0.0","v62.0.0.rc","v62.0.1","v63.0.0","v63.0.0.rc","v64.0.0","v64.0.0.beta1","v64.0.0.beta2","v64.0.0.beta3","v64.0.0.rc","v64.0.0.rc2","v64.0.1","v65.0.0","v65.0.0.beta1","v65.0.0.beta2","v65.0.0.rc","v66.0.0","v66.0.0.beta1","v66.0.0.rc","v66.0.0.rc2","v67.0.0","v67.0.0.rc","v68.0.0","v68.0.0.rc","v69.0.0","v69.0.0.beta1","v69.0.0.beta2","v69.0.0.beta3","v69.0.0.rc","v70.0.0","v70.0.0.rc","v71.0.0","v71.0.0.beta1","v71.0.0.beta2","v71.0.0.rc","v72.0.0","v72.0.0.rc","v73.0.0","v73.0.0.beta1","v73.0.0.rc","v74.0.0","v74.0.0.rc","v74.0.1","v75.0.0","v75.0.0.rc","v75.0.0.rc2","v75.1.0","v76.0.0","v77.0.0","v78.0.0","v78.0.0.beta1","v78.0.0.rc","v79.0.0","v80.0.0","v80.0.0.beta1","v81.0.0","v82.0.0","v83.0.0","v83.0.1","v84.0.0","v84.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4588.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}