Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-25786 | Cross site scripting vulnerability in 188Jianzhan 2.10 allows attackers to execute arbitrary code via the username parameter to /admin/reg.php. |
| Link | Providers |
|---|---|
| https://github.com/vtime-tech/188Jianzhan/issues/4 |
|
Mon, 21 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-21T18:43:56.546Z
Reserved: 2021-08-23T00:00:00.000Z
Link: CVE-2021-39427
Updated: 2024-08-04T02:06:42.543Z
Status : Modified
Published: 2022-12-15T19:15:16.017
Modified: 2025-04-21T19:15:16.803
Link: CVE-2021-39427
No data.
OpenCVE Enrichment
No data.
EUVD