Логотип exploitDog
bind:CVE-2013-4170
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-4170

Количество 3

Количество 3

redhat логотип

CVE-2013-4170

больше 12 лет назад

In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to user-supplied data, a specially-crafted payload could execute arbitrary JavaScript in the context of the current domain ("XSS"). This vulnerability only affects applications that assign or bind user-provided content to `tagName`.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2013-4170

больше 3 лет назад

In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to user-supplied data, a specially-crafted payload could execute arbitrary JavaScript in the context of the current domain ("XSS"). This vulnerability only affects applications that assign or bind user-provided content to `tagName`.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-5m48-c37x-f792

больше 3 лет назад

Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2013-4170

In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to user-supplied data, a specially-crafted payload could execute arbitrary JavaScript in the context of the current domain ("XSS"). This vulnerability only affects applications that assign or bind user-provided content to `tagName`.

CVSS3: 5.9
0%
Низкий
больше 12 лет назад
nvd логотип
CVE-2013-4170

In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to user-supplied data, a specially-crafted payload could execute arbitrary JavaScript in the context of the current domain ("XSS"). This vulnerability only affects applications that assign or bind user-provided content to `tagName`.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-5m48-c37x-f792

Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data

CVSS3: 6.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу