2 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 1

The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements. OWASP Java HTML Sanitizer versiones anteriores a 20211018.1, no aplica apropiadamente las políticas asociadas a los elementos SELECT, STYLE y OPTION • https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpujul2022.html https://access.redhat.com/security/cve/CVE-2021-42575 https://bugzilla.redhat.com/show_bug.cgi?id=2027195 • CWE-20: Improper Input Validation •

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 0

OWASP HTML Sanitizer (aka owasp-java-html-sanitizer) before 88, when JavaScript is disabled, allows user-assisted remote attackers to obtain potentially sensitive information via a crafted FORM element within a NOSCRIPT element. OWASP HTML Sanitizer (también conocido como owasp-java-html-sanitizer) anterior a v88, cuando JavaScript no está habilitado, permite a los usuarios con ayuda de los atacantes remotos obtener información sensible a través de un elemento FORM elaborados dentro de un elemento NOSCRIPT. • http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457 http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/CHANGE_LOG.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •