Количество 4
Количество 4
CVE-2025-66648
vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue.
CVE-2025-66648
vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue.
CVE-2025-66648
vega-functions provides function implementations for the Vega expressi ...
GHSA-m9rg-mr6g-75gm
`vega-functions` vulnerable to Cross-site Scripting via `setdata` function
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-66648 vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue. | CVSS3: 7.2 | 0% Низкий | около 1 месяца назад | |
CVE-2025-66648 vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue. | CVSS3: 7.2 | 0% Низкий | около 1 месяца назад | |
CVE-2025-66648 vega-functions provides function implementations for the Vega expressi ... | CVSS3: 7.2 | 0% Низкий | около 1 месяца назад | |
GHSA-m9rg-mr6g-75gm `vega-functions` vulnerable to Cross-site Scripting via `setdata` function | CVSS3: 7.2 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу