漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
AwesomestCode LiveBot parseMessage.js parseSend cross site scripting
漏洞信息
A vulnerability was found in AwesomestCode LiveBot. It has been classified as problematic. Affected is the function parseSend of the file js/parseMessage.js. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. Upgrading to version 0.1 is able to address this issue. The name of the patch is 57505527f838d1e46e8f93d567ba552a30185bfa. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-257784.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
AwesomestCode LiveBot 跨站脚本漏洞
漏洞信息
LiveBot是Raymond Xu个人开发者的一个使用 electronic 和 discord.js 构建的程序。 AwesomestCode LiveBot存在跨站脚本漏洞,该漏洞源于文件js/parseMessage.js的函数parseSend会导致跨站脚本。
漏洞信息
N/A
漏洞
N/A