Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-28487
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cross-site Scripting (XSS)
Source: NVD (National Vulnerability Database)
Vulnerability Description
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Visjs Vis-timeline 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Visjs Vis-timeline是埃及Visjs社区的一款基于 Javascript 用于生成2D交互式时间轴的代码库。支持通过在时间轴中拖动和滚动来自由移动和缩放时间轴。可以在时间轴中创建,编辑和删除项目。轴上的时间刻度是自动调整的,并且支持的刻度范围从毫秒到年。 vis-timeline before 7.4.4 存在安全漏洞,攻击者可利用该漏洞可以向生成的应用程序注入额外的脚本代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-vis-timeline unspecified ~ 7.4.4 -
II. Public POCs for CVE-2020-28487
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-28487
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-28487

No comments yet


Leave a comment