{"uuid": "c68f2b4c-5c01-417b-a99f-c179386cf95d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36965", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17003", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-36965\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Insufficient sanitization of inputs in QoE application input field could lead to stored and Dom based XSS attack. This issue is fixed and released in SolarWinds Platform (2022.3.0).\n\ud83d\udccf Published: 2022-09-30T16:45:24.996Z\n\ud83d\udccf Modified: 2025-05-20T16:14:58.743Z\n\ud83d\udd17 References:\n1. https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36965\n2. https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm#:~:text=Release%20date%3A%20May%2024%2C%202022%20These%20release%20notes%2Cissues.%20New%20features%20and%20improvements%20in%20SolarWinds%20Platform", "creation_timestamp": "2025-05-20T16:40:47.000000Z"}