No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Reconurge
Reconurge flowsint |
|
| Vendors & Products |
Reconurge
Reconurge flowsint |
Tue, 12 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Prior to 1.2.3, a remote attacker can create a map node with a malicious label that contains arbitrary HTML. When the map tab is selected and a map node marker is selected, it will render the arbitrary HTML, potentially triggering stored XSS. This vulnerability is fixed in 1.2.3. | |
| Title | Flowsint: Stored XSS on map node marker in map page | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-18T14:47:11.543Z
Reserved: 2026-04-24T17:15:21.835Z
Link: CVE-2026-42157
Updated: 2026-05-18T14:46:02.843Z
Status : Deferred
Published: 2026-05-12T23:16:17.343
Modified: 2026-05-18T16:16:30.703
Link: CVE-2026-42157
No data.
OpenCVE Enrichment
Updated: 2026-05-13T01:00:23Z