Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-36738

The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
Exploit prediction scoring system (EPSS) score
EPSS Score 0.159
EPSS Ranking 94.5%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 4.3
Products affected by CVE-2021-36738
  • Apache » Pluto » Version: N/A
    cpe:2.3:a:apache:pluto:-
  • Apache » Pluto » Version: 1.0.1
    cpe:2.3:a:apache:pluto:1.0.1
  • Apache » Pluto » Version: 1.1.0
    cpe:2.3:a:apache:pluto:1.1.0
  • Apache » Pluto » Version: 1.1.1
    cpe:2.3:a:apache:pluto:1.1.1
  • Apache » Pluto » Version: 1.1.2
    cpe:2.3:a:apache:pluto:1.1.2
  • Apache » Pluto » Version: 1.1.3
    cpe:2.3:a:apache:pluto:1.1.3
  • Apache » Pluto » Version: 1.1.4
    cpe:2.3:a:apache:pluto:1.1.4
  • Apache » Pluto » Version: 1.1.5
    cpe:2.3:a:apache:pluto:1.1.5
  • Apache » Pluto » Version: 1.1.6
    cpe:2.3:a:apache:pluto:1.1.6
  • Apache » Pluto » Version: 1.1.7
    cpe:2.3:a:apache:pluto:1.1.7
  • Apache » Pluto » Version: 2.0.0
    cpe:2.3:a:apache:pluto:2.0.0
  • Apache » Pluto » Version: 2.0.1
    cpe:2.3:a:apache:pluto:2.0.1
  • Apache » Pluto » Version: 2.0.2
    cpe:2.3:a:apache:pluto:2.0.2
  • Apache » Pluto » Version: 2.0.3
    cpe:2.3:a:apache:pluto:2.0.3
  • Apache » Pluto » Version: 2.1.0
    cpe:2.3:a:apache:pluto:2.1.0
  • Apache » Pluto » Version: 3.0.0
    cpe:2.3:a:apache:pluto:3.0.0
  • Apache » Pluto » Version: 3.0.1
    cpe:2.3:a:apache:pluto:3.0.1
  • Apache » Pluto » Version: 3.1.0
    cpe:2.3:a:apache:pluto:3.1.0


Contact Us

Shodan ® - All rights reserved