CVE-2021-23416

This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
Configurations

Configuration 1 (hide)

cpe:2.3:a:curly-bracket-parser_project:curly-bracket-parser:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 5.4
References () https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31 - Broken Link () https://github.com/magynhard/curly-bracket-parser/blob/master/src/curly-bracket-parser/curly-bracket-parser.js%23L31 - Broken Link
References () https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-CURLYBRACKETPARSER-1297106 - Exploit, Third Party Advisory

Information

Published : 2021-07-28 16:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23416

Mitre link : CVE-2021-23416

CVE.ORG link : CVE-2021-23416


JSON object : View

Products Affected

curly-bracket-parser_project

  • curly-bracket-parser
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')