Description
exxxxxxxxxxx is an Http eX Frame Google Style JavaScript Guide. exxxxxxxxxxx is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Accessible files are restricted to those with a file extension. Files with no extension such as /etc/passwd throw an error.
Remediation
References
https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx
https://nodesecurity.io/advisories/478
Related Vulnerabilities
CVE-2023-48089 Vulnerability in maven package com.xuxueli:xxl-job-admin
CVE-2020-15131 Vulnerability in npm package slp-validate
CVE-2023-3276 Vulnerability in maven package cn.hutool:hutool-core
CVE-2023-2507 Vulnerability in npm package clevertap-cordova
CVE-2021-23346 Vulnerability in npm package html-parse-stringify2