Description
Countly, a product analytics solution, is vulnerable to cross-site scripting prior to version 21.11 of the community edition. The victim must follow a malicious link or be redirected there from malicious web site. The attacker must have an account or be able to create one. This issue is patched in version 21.11.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19581 | Countly, a product analytics solution, is vulnerable to cross-site scripting prior to version 21.11 of the community edition. The victim must follow a malicious link or be redirected there from malicious web site. The attacker must have an account or be able to create one. This issue is patched in version 21.11. |
References
History
Tue, 11 Mar 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-10T21:09:07.859Z
Reserved: 2021-05-12T00:00:00.000Z
Link: CVE-2021-32852
Updated: 2024-08-03T23:33:56.093Z
Status : Modified
Published: 2023-02-20T22:15:11.160
Modified: 2024-11-21T06:07:53.133
Link: CVE-2021-32852
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD