[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-2855":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":48},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":45,"name":46,"published":47,"updated":27},2855,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":38,"epss_score":39,"epss_percentile":40,"cve":41,"in_cisa_catalog":43,"date":44,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"medium","Attackers can inject malicious JavaScript via reflected XSS, potentially stealing administrator session cookies or performing administrative actions on behalf of authenticated users.","Advantech R-SeeNet 2.4.12 contains a reflected cross-site scripting vulnerability in the ssh_form.php script functionality.","Apply the latest security patches or updates provided by Advantech to fix the XSS vulnerability in R-SeeNet 2.4.12.",[33,34,35,36,37],"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1271","https://nvd.nist.gov/vuln/detail/CVE-2021-21800","https://github.com/ARPSyndicate/cvemon","https://github.com/ARPSyndicate/kenzer-templates","https://github.com/Live-Hack-CVE/CVE-2021-21800",6.1,0.68444,0.98603,[42],"CVE-2021-21800",false,"2021-07-16T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2021-21800","Advantech R-SeeNet 2.4.12 - Cross-Site Scripting","2023-07-04T00:00:00Z",["Island",49],{"key":50,"params":51,"result":53},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":52},"{\"text-color\":\"gray\"}",{"head":54},{}]