Show filters
50 Total Results
Displaying 31-40 of 50
Sort by:
Attacker Value
Unknown
CVE-2021-26539
Disclosure Date: February 08, 2021 (last updated November 28, 2024)
Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
0
Attacker Value
Unknown
CVE-2021-23900
Disclosure Date: January 13, 2021 (last updated November 28, 2024)
OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.
0
Attacker Value
Unknown
CVE-2021-23899
Disclosure Date: January 13, 2021 (last updated February 22, 2025)
OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.
0
Attacker Value
Unknown
CVE-2020-26293
Disclosure Date: January 04, 2021 (last updated February 22, 2025)
HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
0
Attacker Value
Unknown
CVE-2020-4054
Disclosure Date: June 16, 2020 (last updated February 21, 2025)
In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than 5.2.1, there is a cross-site scripting vulnerability. When HTML is sanitized using Sanitize's "relaxed" config, or a custom config that allows certain elements, some content in a math or svg element may not be sanitized correctly even if math and svg are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: iframe, math, noembed, noframes, noscript, plaintext, script, style, svg, xmp. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. This has been fixed in 5.2.1.
0
Attacker Value
Unknown
CVE-2020-13973
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
0
Attacker Value
Unknown
CVE-2020-11070
Disclosure Date: May 13, 2020 (last updated February 21, 2025)
The SVG Sanitizer extension for TYPO3 has a cross-site scripting vulnerability in versions before 1.0.3. Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting. This is fixed in version 1.0.3.
0
Attacker Value
Unknown
CVE-2019-10772
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
0
Attacker Value
Unknown
CVE-2019-18857
Disclosure Date: November 11, 2019 (last updated November 27, 2024)
darylldoyle svg-sanitizer before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring.
0
Attacker Value
Unknown
CVE-2019-18856
Disclosure Date: November 11, 2019 (last updated November 27, 2024)
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.
0