Exploit Report

Computer Security And Bug Information

CVE-2022-4928

CVECVE-2022-4928
CVE Title
Published Date2023-03-06T01:15Z
Modified Date2023-03-13T17:15Z
CWE TypeCWE-79
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
DescriptionA vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The name of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/icplayer/icplayer/commit/2223628e6db1df73f6d633d2c0422d995990f0a3
Reference DescriptionMISC https://github.com/icplayer/icplayer/commit/2223628e6db1df73f6d633d2c0422d995990f0a3
Reference URLhttps://github.com/icplayer/icplayer/pull/881
Reference DescriptionMISC https://github.com/icplayer/icplayer/pull/881
Reference URLhttps://github.com/icplayer/icplayer/releases/tag/v0.820
Reference DescriptionMISC https://github.com/icplayer/icplayer/releases/tag/v0.820
Reference URLhttps://vuldb.com/?ctiid.222289
Reference DescriptionMISC https://vuldb.com/?ctiid.222289
Reference URLhttps://vuldb.com/?id.222289
Reference DescriptionMISC https://vuldb.com/?id.222289
TagsPatch
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles