Search for packages
| purl | pkg:deb/debian/ruby-rails-html-sanitizer@1.0.3-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2ece-9xu2-z7ea | XSS vulnerability - white list bypass Carefully crafted strings can cause user input to bypass the sanitization in the white list sanitizer which can lead to an XSS attack. |
CVE-2015-7580
GHSA-ghqm-pgxj-37gq |
| VCID-nc6s-6usd-gkeb | Possible XSS vulnerability Certain attributes are not removed from tags when they are sanitized, and these attributes can lead to an XSS attack on target applications. |
CVE-2015-7578
GHSA-59c7-4xj2-hgvw |
| VCID-ujza-s7ug-9fcp | XSS vulnerability in strip_tags Due to the way that `Rails::Html::FullSanitizer` is implemented, if an attacker passes an already escaped HTML entity to the input of Action View's `strip_tags` these entities will be unescaped what may cause a XSS attack if used in combination with `raw` or `html_safe`. |
CVE-2015-7579
GHSA-r9c2-cr39-c8g6 |