Описание
XSS in knockout
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-14862
- https://github.com/knockout/knockout/issues/1244
- https://github.com/knockout/knockout/pull/2345
- https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862
- https://snyk.io/vuln/npm:knockout:20180213
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015
Пакеты
knockout
< 3.5.0
3.5.0
Связанные уязвимости
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
There is a vulnerability in knockout before version 3.5.0-beta, where ...
Уязвимость библиотеки Knockout.js, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществить межсайтовую сценарную атаку