CVE-2021-4265

A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216467.
Configurations

Configuration 1 (hide)

cpe:2.3:a:siwapp:siwapp-ror:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
References () https://github.com/siwapp/siwapp-ror/commit/924d16008cfcc09356c87db01848e45290cb58ca - Patch () https://github.com/siwapp/siwapp-ror/commit/924d16008cfcc09356c87db01848e45290cb58ca - Patch
References () https://github.com/siwapp/siwapp-ror/pull/365 - Patch () https://github.com/siwapp/siwapp-ror/pull/365 - Patch
References () https://vuldb.com/?id.216467 - Third Party Advisory () https://vuldb.com/?id.216467 - Third Party Advisory
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 3.5

01 Feb 2024, 17:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:siwapp:siwapp-ror:*:*:*:*:*:*:*:*
CWE CWE-74
CWE-707
References (N/A) https://github.com/siwapp/siwapp-ror/pull/365 - (N/A) https://github.com/siwapp/siwapp-ror/pull/365 - Patch
References (N/A) https://vuldb.com/?id.216467 - (N/A) https://vuldb.com/?id.216467 - Third Party Advisory
References (N/A) https://github.com/siwapp/siwapp-ror/commit/924d16008cfcc09356c87db01848e45290cb58ca - (N/A) https://github.com/siwapp/siwapp-ror/commit/924d16008cfcc09356c87db01848e45290cb58ca - Patch

21 Dec 2022, 19:23

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-21 19:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4265

Mitre link : CVE-2021-4265

CVE.ORG link : CVE-2021-4265


JSON object : View

Products Affected

siwapp

  • siwapp-ror
CWE
CWE-707

Improper Neutralization

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')