2 results (0.005 seconds)

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 0

Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability. • https://www.herodevs.com/vulnerability-directory/cve-2024-9506 • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code. Se ha descubierto una vulnerabilidad en Vue que permite a un atacante realizar XSS mediante contaminación de prototipos. El atacante podría cambiar la cadena de prototipos de algunas propiedades como `Object.prototype.staticClass` o `Object.prototype.staticStyle` para ejecutar código JavaScript arbitrario. • https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss https://www.herodevs.com/vulnerability-directory/cve-2024-6783 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •