{"id":"CVE-2021-4312","details":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.","modified":"2026-03-15T14:45:15.981284Z","published":"2023-01-13T18:15:10.833Z","references":[{"type":"REPORT","url":"https://vuldb.com/?ctiid.218295"},{"type":"REPORT","url":"https://vuldb.com/?id.218295"},{"type":"FIX","url":"https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/th3-822/rapidleech","events":[{"introduced":"0"},{"fixed":"885a87ea4ee5e14fa95801eca255604fb2e138c6"}]},{"type":"GIT","repo":"https://github.com/th3-822/rapidleech","events":[{"introduced":"0"},{"fixed":"885a87ea4ee5e14fa95801eca255604fb2e138c6"}]}],"versions":["rev_43"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4312.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2021-09-11"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}