Show filters
732 Total Results
Displaying 171-180 of 732
Sort by:
Attacker Value
Unknown
CVE-2023-0978
Disclosure Date: March 13, 2023 (last updated February 24, 2025)
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
0
Attacker Value
Unknown
CVE-2022-48345
Disclosure Date: February 24, 2023 (last updated February 24, 2025)
sanitize-url (aka @braintree/sanitize-url) before 6.0.2 allows XSS via HTML entities.
0
Attacker Value
Unknown
CVE-2022-26115
Disclosure Date: February 16, 2023 (last updated February 24, 2025)
A use of password hash with insufficient computational effort vulnerability [CWE-916] in FortiSandbox before 4.2.0 may allow an attacker with access to the password database to efficiently mount bulk guessing attacks to recover the passwords.
0
Attacker Value
Unknown
CVE-2023-23627
Disclosure Date: January 28, 2023 (last updated February 24, 2025)
Sanitize is an allowlist-based HTML and CSS sanitizer. Versions 5.0.0 and later, prior to 6.0.1, are vulnerable to Cross-site Scripting. When Sanitize is configured with a custom allowlist that allows `noscript` elements, attackers are able to include arbitrary HTML, resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. The default configurations do not allow `noscript` elements and are not vulnerable. This issue only affects users who are using a custom config that adds `noscript` to the element allowlist. This issue has been patched in version 6.0.1. Users who are unable to upgrade can prevent this issue by using one of Sanitize's default configs or by ensuring that their custom config does not include `noscript` in the element allowlist.
0
Attacker Value
Unknown
CVE-2022-42704
Disclosure Date: January 13, 2023 (last updated February 24, 2025)
A cross-site scripting (XSS) vulnerability in Employee Service Center (esc) and Service Portal (sp) in ServiceNow Quebec, Rome, and San Diego allows remote attackers to inject arbitrary web script via the Standard Ticket Conversations widget.
0
Attacker Value
Unknown
CVE-2023-22461
Disclosure Date: January 04, 2023 (last updated February 24, 2025)
The `sanitize-svg` package, a small SVG sanitizer to prevent cross-site scripting attacks, uses a deny-list-pattern to sanitize SVGs to prevent XSS. In doing so, literal `<script>`-tags and on-event handlers were detected in versions prior to 0.4.0. As a result, downstream software that relies on `sanitize-svg` and expects resulting SVGs to be safe, may be vulnerable to cross-site scripting. This vulnerability was addressed in v0.4.0. There are no known workarounds
0
Attacker Value
Unknown
CVE-2022-44137
Disclosure Date: December 30, 2022 (last updated February 24, 2025)
SourceCodester Sanitization Management System 1.0 is vulnerable to SQL Injection.
0
Attacker Value
Unknown
CVE-2022-4726
Disclosure Date: December 27, 2022 (last updated February 24, 2025)
A vulnerability classified as critical was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216739.
0
Attacker Value
Unknown
CVE-2022-23520
Disclosure Date: December 14, 2022 (last updated February 24, 2025)
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both "select" and "style" should either upgrade or use this workaround: Remove either "select" or "style" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.
0
Attacker Value
Unknown
CVE-2022-23519
Disclosure Date: December 14, 2022 (last updated February 24, 2025)
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways: allow both "math" and "style" elements, or allow both "svg" and "style" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include "math" or "svg" and "style" should either upgrade or use the following workaround immediately: Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags.
0