The Cedar Gate EZ-NET portal 6.5.5 6.8.0 Internet portal has a call to display messages to users which does not properly sanitize data sent in through a URL parameter. This leads to a Reflected Cross-Site Scripting vulnerability. NOTE: the vendor disputes this because the ado.im reference has "no clear steps of reproduction."
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://ado.im/cedar-gate-ez-net |
|
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 29 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-04T00:00:00
Updated: 2024-10-29T20:54:49.854Z
Reserved: 2022-01-18T00:00:00
Link: CVE-2022-23397
Updated: 2024-08-03T03:43:45.215Z
Status : Modified
Published: 2022-03-04T15:15:09.227
Modified: 2024-11-21T06:48:30.540
Link: CVE-2022-23397
No data.
ReportizFlow