"value":"A cross-site scripting (XSS) vulnerability in CesiumJS v1.111 allows attackers to execute arbitrary code in the context of the victim's browser via sending a crafted payload to /container_files/public_html/doc/index.html. NOTE: the vendor\u2019s position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product."
"value":"Una vulnerabilidad de cross-site scripting (XSS) en CesiumJS v1.111 permite a los atacantes ejecutar c\u00f3digo arbitrario en el contexto del navegador de la v\u00edctima enviando un payload dise\u00f1ado a /container_files/public_html/doc/index.html."