A vulnerability was found in juju2143 WalrusIRC 0.0.2. It has been rated as problematic. This issue affects the function parseLinks of the file public/parser.js. The manipulation of the argument text leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 0.0.3 is able to address this issue. The name of the patch is 45fd885895ae13e8d9b3a71e89d59768914f60af. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220751.
More Stories
ruby-3.3.8-19.fc41
FEDORA-2025-60513bdbbd Packages in this update: ruby-3.3.8-19.fc41 Update description: Upgrade to Ruby 3.3.8. CVE-2025-25186: Fix Net::IMAP vulnerable to possible DoS by...
dnf-4.23.0-1.fc40.1
FEDORA-2025-21c36b3aa5 Packages in this update: dnf-4.23.0-1.fc40.1 Update description: This releases preserves enablement state of dnf-automatic.timer when upgrading to Fedora 41....
podman-tui-1.5.0-2.el9
FEDORA-EPEL-2025-7c57e75cbc Packages in this update: podman-tui-1.5.0-2.el9 Update description: release v1.5.0 Read More
prometheus-podman-exporter-1.16.0-1.fc42
FEDORA-2025-12ac4e9cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.fc42 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.fc41
FEDORA-2025-b0915f0a19 Packages in this update: prometheus-podman-exporter-1.16.0-1.fc41 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.el9
FEDORA-EPEL-2025-6653a27cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.el9 Update description: release 1.16.0 Read More