VncViewer Plugin 1.7 and earlier does not escape a parameter value in the checkVncServ form validation endpoint output.
This results in a reflected cross-site scripting (XSS) vulnerability.
VncViewer Plugin 1.8 escapes the parameter value in the output.
{
"severity": "MODERATE",
"github_reviewed": true,
"nvd_published_at": "2020-07-02T15:15:00Z",
"github_reviewed_at": "2022-12-29T00:27:48Z",
"cwe_ids": [
"CWE-79"
]
}