Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34101 | A vulnerability was found in ctrlo lenio and classified as problematic. Affected by this issue is some unknown functionality of the file views/contractor.tt. The manipulation of the argument contractor.name leads to cross site scripting. The attack may be launched remotely. The name of the patch is e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216212. |
Tue, 15 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-04-15T12:59:27.736Z
Reserved: 2022-12-18T00:00:00.000Z
Link: CVE-2021-4255
Updated: 2024-08-03T17:23:10.603Z
Status : Modified
Published: 2022-12-18T22:15:10.467
Modified: 2024-11-21T06:37:14.853
Link: CVE-2021-4255
No data.
OpenCVE Enrichment
No data.
EUVD