{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T23:27:09.804","vulnerabilities":[{"cve":{"id":"CVE-2021-44478","sourceIdentifier":"productcert@siemens.com","published":"2022-03-08T12:15:11.337","lastModified":"2024-11-21T06:31:02.857","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Polarion ALM (All versions < V21 R2 P2), Polarion WebClient for SVN (All versions). A cross-site scripting is present due to improper neutralization of data sent to the web page through the SVN WebClient in the affected product. An attacker could exploit this to execute arbitrary code and extract sensitive information by sending a specially crafted link to users with administrator privileges."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Polarion ALM (Todas las versiones anteriores a V21 R2 P2), Polarion WebClient para SVN (Todas las versiones). Existe un cross-site scripting debido a una incorrecta neutralización de los datos enviados a la página web a través del SVN WebClient en el producto afectado. Un atacante podría explotar esto para ejecutar código arbitrario y extraer información sensible enviando un enlace especialmente diseñado a usuarios con privilegios de administrador"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:polarion_alm:*:*:*:*:*:*:*:*","versionEndExcluding":"21.0","matchCriteriaId":"3BF50F47-0B99-4E3D-A968-84394548BE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:polarion_alm:21.0:-:*:*:*:*:*:*","matchCriteriaId":"E5DDA237-333B-4957-8DB2-584CADBF8257"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:polarion_alm:21.0:r1:*:*:*:*:*:*","matchCriteriaId":"E8136C0F-FB0A-4459-8741-05148BF97A5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:polarion_alm:21.0:r2:*:*:*:*:*:*","matchCriteriaId":"1562F4BE-6770-4814-9F80-F1D45B3509C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:polarion_subversion_webclient:*:*:*:*:*:*:*:*","matchCriteriaId":"F8C6D584-AB51-40BA-9E4E-1F635297738D"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-562051.pdf","source":"productcert@siemens.com","tags":["Patch","Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-562051.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}