Welcome to the Question2Answer Q&A. There's also a demo if you just want to try it out.
0 votes
447 views
in Q2A Core by
Location
src\qa-include\app\format.php:272
Source File
src\qa-include\app\format.php
Availability Impact
Partial
Confidentiality Impact
Partial
Integrity Impact
Partial
CWE:
  • 79
API:
Potential user controlled data within PHP converted to HTML

<a href="' . qa_path_html('ip/' . $ip) . '" title="' . qa_lang_html_sub('main/ip_address_x', qa_html($ip)) . '" class="qa-ip-link">' . $anchorhtml . '</a>

by
Where are you seeing that report?

1 Answer

+3 votes
by

It's not a security issue, because the input apparently is being sanitzed. If it weren't that would be a code injection vulnerabilty.

...