CVE-2021-4296

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-4296
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4296.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-4296
Published
2022-12-29T09:15:08Z
Modified
2025-05-19T03:10:13.310588Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019.

References

Affected packages

Git / github.com/w3c/unicorn

Affected ranges

Type
GIT
Repo
https://github.com/w3c/unicorn
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0