6.1
CVE-2020-21993
- EPSS 0.24%
- Veröffentlicht 28.04.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 05:12:59
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wems ≫ Enterprise Manager Version2.19.7959
Wems ≫ Enterprise Manager Version2.55.8782
Wems ≫ Enterprise Manager Version2.55.8806
Wems ≫ Enterprise Manager Version2.58.8903
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.24% | 0.445 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.