CVE-2021-26723

Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenzabar:jenzabar:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry
References () https://gist.github.com/Y0ung-DST/d1b6b65be6248b0ffc2b2f2120deb205 - Exploit, Third Party Advisory () https://gist.github.com/Y0ung-DST/d1b6b65be6248b0ffc2b2f2120deb205 - Exploit, Third Party Advisory
References () https://jenzabar.com/blog - Vendor Advisory () https://jenzabar.com/blog - Vendor Advisory
References () https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328 - Exploit, Third Party Advisory () https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328 - Exploit, Third Party Advisory

Information

Published : 2021-02-06 06:15

Updated : 2024-11-21 05:56


NVD link : CVE-2021-26723

Mitre link : CVE-2021-26723

CVE.ORG link : CVE-2021-26723


JSON object : View

Products Affected

jenzabar

  • jenzabar
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')