Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2018-25051: Prevent from XSS · JmPotato/Pomash@be1914e

A vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability.

CVE
#xss#vulnerability#nodejs#js

@@ -1,6 +1,22 @@

{% extends ‘layout.html’ %}

{% block title %} | {{ article.title }}{% end %}

{% block title %} | {{ handler.get_pure_title(article.title) }}{% end %}

{% block head %}

<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/[email protected]/dist/katex.min.css" integrity="sha384-9eLZqc9ds8eNjO3TmqPeYcDj8n+Qfa4nuSiGYa6DjLNcv9BtN69ZIulL9+8CqC9Y" crossorigin="anonymous">

<script defer src="https://cdn.jsdelivr.net/npm/[email protected]/dist/katex.min.js" integrity="sha384-K3vbOmF2BtaVai+Qk37uypf7VrgBubhQreNQe9aGsz9lB63dIFiQVlJbr92dw2Lx" crossorigin="anonymous"></script>

<script defer src="https://cdn.jsdelivr.net/npm/[email protected]/dist/contrib/auto-render.min.js" integrity="sha384-kmZOZB5ObwgQnS/DuDg6TScgOiWWBiVt0plIRkZCmE6rDZGrEOQeHM5PcHi+nyqe" crossorigin="anonymous"></script>

<script>

document.addEventListener("DOMContentLoaded", function() {

renderMathInElement(document.getElementById(“article”), {

delimiters: [

{left: "$$", right: "$$", display: true},

{left: "$", right: "$", display: false}

]

});

});

</script>

{% end %}

{% block content %}

<div class="post">

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda