{"id":"CVE-2021-4263","details":"A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability.","aliases":["GHSA-6cmv-2548-82v4"],"modified":"2026-02-24T01:22:37.249238Z","published":"2022-12-21T19:15:12.350Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?ctiid.216461"},{"type":"ADVISORY","url":"https://vuldb.com/?id.216461"},{"type":"FIX","url":"https://github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/leanote/leanote","events":[{"introduced":"0"},{"fixed":"0f9733c890077942150696dcc6d2b1482b7a0a19"}]}],"versions":["0.1","0.2","0.3","0.4","0.5","1.0","1.0-beta","1.0-beta.2","1.0-beta.3","1.0-beta.4","1.0-beta.5","1.0.1","1.1","1.2","1.3","1.3.1","1.4","1.4.1","1.4.2","2.0","2.1","2.2","2.2.1","2.2.2","2.3","2.4","2.5","2.6","2.6.1","v0.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4263.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}