Description
In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-14759 | In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:30:33.777Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-21993
No data.
Status : Modified
Published: 2021-04-28T15:15:07.883
Modified: 2024-11-21T05:12:59.067
Link: CVE-2020-21993
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD