A vulnerability, which was classified as problematic, has been found in go4rayyan Scumblr up to 2.0.1a. Affected by this issue is some unknown functionality of the component Task Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.2 is able to address this issue. The patch is identified as 5c9120f2362ddb7cbe48f2c4620715adddc4ee35. It is recommended to upgrade the affected component. VDB-251570 is the identifier assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://vuldb.com/?id.251570 | Third Party Advisory |
| https://vuldb.com/?ctiid.251570 | Permissions Required Third Party Advisory |
| https://github.com/go4rayyan/CG1/commit/5c9120f2362ddb7cbe48f2c4620715adddc4ee35 | Patch |
| https://github.com/go4rayyan/CG1/releases/tag/v2.0.2 | Release Notes |
Configurations
History
26 Jan 2024, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:go4rayyan:scumblr:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| First Time |
Go4rayyan
Go4rayyan scumblr |
|
| References | () https://github.com/go4rayyan/CG1/releases/tag/v2.0.2 - Release Notes | |
| References | () https://vuldb.com/?ctiid.251570 - Permissions Required, Third Party Advisory | |
| References | () https://github.com/go4rayyan/CG1/commit/5c9120f2362ddb7cbe48f2c4620715adddc4ee35 - Patch | |
| References | () https://vuldb.com/?id.251570 - Third Party Advisory |
21 Jan 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-21 06:15
Updated : 2024-05-17 01:08
NVD link : CVE-2016-15037
Mitre link : CVE-2016-15037
JSON object : View
Products Affected
go4rayyan
- scumblr
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
