Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-28079

EPSS 2.15% · P84
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-28079

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
jamovi 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
jamovi是jamovi开源的一个应用软件。一个免费且开放的统计平台。 Jamovi 1.6.18版本及之前版本存在安全漏洞,攻击者可利用该漏洞可以创建一个包含有效负载的.omv (Jamovi)文档。被受害者打开后,有效载荷就会被触发。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-28079

#POC DescriptionSource LinkShenlong Link
1POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.https://github.com/g33xter/CVE-2021-28079POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-28079

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-04-26 · 20 CVEs total

CVE-2021-233825.3 MEDIUMRegular Expression Denial of Service (ReDoS)
CVE-2021-233654.8 MEDIUMAuthentication Bypass
CVE-2021-25839MINTHCM 安全漏洞
CVE-2021-31804leocad 资源管理错误漏洞
CVE-2021-31803cPanel 跨站脚本漏洞
CVE-2021-25927safe-flat 安全漏洞
CVE-2021-25928safe-obj 安全漏洞
CVE-2021-26797Hame SD1 Wi-Fi 安全漏洞
CVE-2021-31802NETGEAR R7000 缓冲区错误漏洞
CVE-2020-15078OpenVPN 访问控制错误漏洞
CVE-2021-25838MintHCM 跨站脚本漏洞
CVE-2021-22669Advantech WebAccess SCADA 安全漏洞
CVE-2021-28399Orangehrm 安全漏洞
CVE-2021-3494Foreman 安全漏洞
CVE-2021-3472X.Org X Server 数字错误漏洞
CVE-2020-36325jansson 缓冲区错误漏洞
CVE-2021-31784Open Design Alliance Drawings SDK 缓冲区错误漏洞
CVE-2021-31783LocalFilesEditor 数据伪造问题漏洞
CVE-2021-31646Gestsup 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2021-28079

No comments yet


Leave a comment