Description
A vulnerability, which was classified as problematic, was found in yolapi. Affected is the function render_description of the file yolapi/pypi/metadata.py. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a0fe129055a99f429133a5c40cb13b44611ff796. It is recommended to apply a patch to fix this issue. VDB-216966 is the identifier assigned to this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-13822 | A vulnerability, which was classified as problematic, was found in yolapi. Affected is the function render_description of the file yolapi/pypi/metadata.py. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a0fe129055a99f429133a5c40cb13b44611ff796. It is recommended to apply a patch to fix this issue. VDB-216966 is the identifier assigned to this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-05T12:26:39.643Z
Reserved: 2022-12-28T11:31:48.879Z
Link: CVE-2018-25056
No data.
Status : Modified
Published: 2022-12-28T12:15:08.893
Modified: 2024-11-21T04:03:27.353
Link: CVE-2018-25056
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD