cve/2015/CVE-2015-10021.md

18 lines
920 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-10021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-10021)
![](https://img.shields.io/static/v1?label=Product&message=definely&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen)
### Description
A vulnerability was found in ritterim definely. It has been classified as problematic. Affected is an unknown function of the file src/database.js. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is b31a022ba4d8d17148445a13ebb5a42ad593dbaa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217608.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2015-10021