Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details...
5.3CVSS
7.2AI Score
0.0004EPSS
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment...
7.5CVSS
7.4AI Score
0.001EPSS
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts...
5.3CVSS
5.5AI Score
0.001EPSS
Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames"...
5.3CVSS
5.4AI Score
0.001EPSS
6.1CVSS
6.2AI Score
0.001EPSS
sanitize-html is a library for scrubbing html input for malicious values Versions 1.2.2 and below have a cross site scripting...
6.1CVSS
6AI Score
0.001EPSS
Sanitize-html is a library for scrubbing html input of malicious values. Versions 1.11.1 and below are vulnerable to cross site scripting (XSS) in certain scenarios: If allowed at least one nonTextTags, the result is a potential XSS...
6.1CVSS
5.8AI Score
0.001EPSS