{"id":"CVE-2021-4256","details":"A vulnerability was found in ctrlo lenio. It has been classified as problematic. This affects an unknown part of the file views/index.tt. The manipulation of the argument task.name/task.site.org.name leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97. It is recommended to apply a patch to fix this issue. The identifier VDB-216213 was assigned to this vulnerability.","modified":"2026-05-18T05:53:09.437347311Z","published":"2022-12-18T22:15:10.547Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"2021-02-08"}],"source":"CPE_FIELD","vendor_product":"ctrlo:lenio","cpes":["cpe:2.3:a:ctrlo:lenio:*:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.216213"},{"type":"FIX","url":"https://github.com/ctrlo/lenio/commit/e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ctrlo/lenio","events":[{"introduced":"0"},{"fixed":"e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97"}],"database_specific":{"source":"REFERENCES"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4256.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}