{"id":"CVE-2022-28588","details":"In SpringBootMovie \u003c=1.2 when adding movie names, malicious code can be stored because there are no filtering parameters, resulting in stored XSS.","modified":"2026-03-14T01:44:37.634550Z","published":"2022-05-03T18:15:08.943Z","references":[{"type":"REPORT","url":"https://github.com/lkmc2/SpringBootMovie/issues/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lkmc2/springbootmovie","events":[{"introduced":"0"},{"last_affected":"4084a8ee6e9afb9caac8866fa47794abe8c486c1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.2"}]}}],"versions":["v1.0","v1.1","v1.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-28588.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}