Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2670 | gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms. |
Github GHSA |
GHSA-vwhg-jwr4-vxgg | gettext.js has a Cross-site Scripting injection |
Fri, 16 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Aug 2024 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms. | |
| Title | gettext.js vulnerable to cross-site scripting (XSS) | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-16T15:10:20.251Z
Reserved: 2024-08-09T14:23:55.513Z
Link: CVE-2024-43370
Updated: 2024-08-16T15:10:10.336Z
Status : Deferred
Published: 2024-08-16T02:15:17.487
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-43370
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA