A vulnerability was found in qt-users-jp silk 0.0.1. It has been declared as problematic. This vulnerability affects unknown code of the file contents/root/examples/header.qml. The manipulation of the argument model.key/model.value leads to cross site scripting. The attack can be initiated remotely. The name of the patch is bbc5d6eeea800025ef29edda3fd3c57836239eae. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221488.
References
Link | Resource |
---|---|
https://github.com/qt-users-jp/silk/commit/bbc5d6eeea800025ef29edda3fd3c57836239eae | Patch |
https://vuldb.com/?ctiid.221488 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.221488 | Permissions Required Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-02-20 08:15
Updated : 2024-05-17 00:58
NVD link : CVE-2014-125088
Mitre link : CVE-2014-125088
CVE.ORG link : CVE-2014-125088
JSON object : View
Products Affected
qt-users
- silk
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')