This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
Not assigned yet | |
- Name of affected product and versions | |
https://github.com/web-platform-tests/wpt | |
version <= commit 938e843 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in /dom/ranges/Range-test-iframe.html. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
CVE-2024-24055 | |
- Name of affected product and versions | |
https://github.com/anuraghazra/Verly.js | |
version <= v1.3.0 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in /index.js. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
Not assigned yet | |
- Name of affected product and versions | |
https://github.com/stewdio/beep.js | |
version <= commit ef22ad7 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in beep/Beep.Instrument.js. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
Not assigned yet | |
- Name of affected product and versions | |
https://github.com/jstrieb/urlpages | |
version <= commit 035b647 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in /index.html. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
CVE-2024-24052 | |
- Name of affected product and versions | |
https://github.com/clappr/clappr | |
version <= 0.5.0 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in /packages/player/public/index.html. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
Not assigned yet | |
- Name of affected product and versions | |
https://github.com/tabatkins/railroad-diagrams | |
version <= commit ea9a123 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in /generator.html. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
CVE-2023-47417 | |
- Name of affected product and versions | |
github.com/paulrouget/dzslides | |
All versions after 2011.07.25 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in shells/embedder.html. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
CVE-2023-48094 | |
- Name of affected product and versions | |
https://github.com/CesiumGS/cesium | |
version <= 1.111 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in Apps/Sandcastle/standalone.html. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- CVE ID | |
CVE-2023-46492 | |
- Name of affected product and versions | |
github.com/mldbai/mldb | |
version <= 2017.04.17.0 | |
- Problem type | |
Attacker can execute arbitrary javascript code in victim's browser by sending specifically crafted url that exploits DOM based XSS in container_files/public_html/doc/index.html. |