5.4
CVE-2021-23283
- EPSS 0.2%
- Veröffentlicht 19.04.2022 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:51:29
- Quelle CybersecurityCOE@eaton.com
- CVE-Watchlists
- Unerledigt
Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Eaton ≫ Intelligent Power Protector Version < 1.69
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.2% | 0.418 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
| nvd@nist.gov | 3.5 | 6.8 | 2.9 |
AV:N/AC:M/Au:S/C:N/I:P/A:N
|
| CybersecurityCOE@eaton.com | 5.2 | 0.9 | 4.2 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.