Логотип exploitDog
bind:CVE-2020-21993
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-21993

Количество 2

Количество 2

nvd логотип

CVE-2020-21993

почти 5 лет назад

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-4j8r-3vg3-2hg4

больше 3 лет назад

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-21993

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

CVSS3: 6.1
0%
Низкий
почти 5 лет назад
github логотип
GHSA-4j8r-3vg3-2hg4

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу