A vulnerability was found in juju2143 WalrusIRC 0.0.2. It has been rated as problematic. This issue affects the function parseLinks of the file public/parser.js. The manipulation of the argument text leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 0.0.3 is able to address this issue. The name of the patch is 45fd885895ae13e8d9b3a71e89d59768914f60af. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220751.
References
Link | Resource |
---|---|
https://github.com/juju2143/walrusirc/commit/45fd885895ae13e8d9b3a71e89d59768914f60af | Patch |
https://github.com/juju2143/walrusirc/releases/tag/0.0.3 | Release Notes |
https://vuldb.com/?ctiid.220751 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.220751 | Third Party Advisory |
Configurations
History
22 Feb 2023, 20:13
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-13 22:15
Updated : 2024-05-17 01:03
NVD link : CVE-2015-10079
Mitre link : CVE-2015-10079
CVE.ORG link : CVE-2015-10079
JSON object : View
Products Affected
walrusirc_project
- walrusirc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')