Issue in HTML Tidy v5.7.28 allows arbitrary code execution via -g option in gdoc.
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 17 Feb 202318:15 | – | prion |
![]() | Ubuntu 20.04 LTS / 22.04 LTS / 23.04 / 23.10 : HTML Tidy vulnerability (USN-6483-1) | 15 Nov 202300:00 | – | nessus |
![]() | CBL Mariner 2.0 Security Update: tidy (CVE-2021-33391) | 3 Jul 202400:00 | – | nessus |
![]() | CVE-2021-33391 affecting package tidy for versions less than 5.8.0-6 | 25 May 202309:38 | – | cbl_mariner |
![]() | CVE-2021-33391 affecting package tidy for versions less than 5.8.0-6 | 19 Mar 202417:21 | – | cbl_mariner |
![]() | CVE-2021-33391 | 17 Feb 202300:00 | – | cvelist |
![]() | tidy-html5 vulnerability | 15 Nov 202314:31 | – | osv |
![]() | CVE-2021-33391 | 17 Feb 202300:00 | – | ubuntucve |
![]() | Ubuntu: Security Advisory (USN-6483-1) | 16 Nov 202300:00 | – | openvas |
![]() | Advisory ROSA-SA-2025-2658 | 28 Jan 202519:30 | – | rosalinux |
Source | Link |
---|---|
github | www.github.com/htacg/tidy-html5/issues/946 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo