Описание
A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The patch is identified as 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability.
Ссылки
- https://github.com/mportuga/eslint-detailed-reporter/commit/505c190efd4905990db6207863bdcbd9b1d7e1bdPatch
- Patch
- Permissions Required
- Permissions Required
- https://github.com/mportuga/eslint-detailed-reporter/commit/505c190efd4905990db6207863bdcbd9b1d7e1bdPatch
- Patch
- Permissions Required
- Permissions Required
Уязвимые конфигурации
Конфигурация 1Версия до 0.9.0 (включая)
cpe:2.3:a:eslint-detailed-reporter_project:eslint-detailed-reporter:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 26%
0.0009
Низкий
3.5 Low
CVSS3
6.1 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 3.5
github
почти 3 года назад
eslint-detailed-reporter vulnerable to cross-site scripting
EPSS
Процентиль: 26%
0.0009
Низкий
3.5 Low
CVSS3
6.1 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-79