First published: Wed Dec 21 2022(Updated: )
A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/leanote/leanote | <=2.6.1 | |
Leanote Leanote | <2021-03-27 | |
=2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4263 is a vulnerability in the leanote software that allows for cross-site scripting attacks.
CVE-2021-4263 affects the function define of the file 'public/js/plugins/history.js' in leanote, leading to cross-site scripting vulnerabilities.
The severity of CVE-2021-4263 is classified as medium, with a severity value of 6.1.
The affected version of leanote for CVE-2021-4263 is up to and inclusive of version 2.6.1.
To fix the CVE-2021-4263 vulnerability in leanote, update to a version beyond 2.6.1 by applying the appropriate patch.