CVE-2021-4293

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-4293
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4293.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-4293
Published
2022-12-28T09:15:08Z
Modified
2024-08-03T22:30:24.415886Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

* UNSUPPORTED WHEN ASSIGNED * A vulnerability classified as problematic has been found in gnuboard youngcart5 up to 5.4.5.1. Affected is an unknown function of the file adm/menulistupdate.php. The manipulation of the argument me_link leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 5.4.5.2 is able to address this issue. The name of the patch is 70daa537adfa47b87af12d85f1e698fff01785ff. It is recommended to upgrade the affected component. VDB-216954 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References

Affected packages

Git / github.com/gnuboard/youngcart5

Affected ranges

Type
GIT
Repo
https://github.com/gnuboard/youngcart5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.0.14
5.0.15
5.0.16
5.0.17
5.0.20
5.0.21
5.0.22
5.0.23
5.0.24
5.0.25
5.0.26
5.0.27
5.0.28
5.0.29
5.0.30
5.0.31
5.0.32
5.0.33
5.0.34
5.0.35
5.0.36
5.0.37
5.0.38
5.0.39
5.0.40
5.0.41
5.0.42
5.0.43
5.0.44
5.1.0
5.1.1
5.1.10
5.1.11
5.1.12
5.1.13
5.1.14
5.1.15
5.1.16
5.1.17
5.1.18
5.1.19
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8
5.1.9
5.2.0
5.2.1
5.2.2
5.2.3
5.2.4
5.2.4.1
5.2.5
5.2.6
5.2.7.1
5.2.9
5.2.9.1
5.2.9.2
5.2.9.3
5.2.9.4
5.2.9.5
5.2.9.6
5.2.9.7
5.2.9.8
5.2.9.8.1
5.2.9.8.2
5.2.9.8.3
5.2.9.8.4
5.3.1
5.3.1.1
5.3.1.2
5.3.1.3
5.3.1.4
5.3.1.5
5.3.1.6
5.3.1.7
5.3.1.8
5.3.1.9
5.3.2.0
5.3.2.1
5.3.2.2
5.3.2.3
5.3.2.4
5.3.2.5
5.3.2.6
5.3.2.7
5.3.2.8
5.3.2.8.1
5.3.2.9
5.3.2.9.1
5.3.3
5.3.3.1
5.3.3.2
5.3.3.3
5.3.3.3.1
5.4.1
5.4.1.1
5.4.1.1.1
5.4.1.2
5.4.1.3
5.4.1.4
5.4.1.7
5.4.1.8
5.4.1.9
5.4.2
5.4.2.1
5.4.2.2
5.4.2.3
5.4.2.3.1
5.4.2.4
5.4.2.5
5.4.2.5.1
5.4.2.6
5.4.2.7.1
5.4.2.8
5.4.2.8.1
5.4.2.9
5.4.3
5.4.3.1
5.4.4
5.4.4.1
5.4.4.2
5.4.4.3
5.4.4.4
5.4.4.5
5.4.4.6
5.4.4.6.1
5.4.4.7
5.4.4.7.1
5.4.4.8
5.4.4.9
5.4.4.9.1
5.4.5
5.4.5.1