Showing 57 of 57 total issues
Unsanitized input leading to code injection in Dalli Open
dalli (2.7.10)
- Read upRead up
- Exclude checks
Update packaged libxml2 (2.9.12 → 2.9.13) and libxslt (1.1.34 → 1.1.35) Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Inefficient Regular Expression Complexity in Nokogiri Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Possible XSS vulnerability with certain configurations of rails-html-sanitizer Open
rails-html-sanitizer (1.3.0)
- Read upRead up
- Exclude checks
Inefficient Regular Expression Complexity in rails-html-sanitizer Open
rails-html-sanitizer (1.3.0)
- Read upRead up
- Exclude checks
Update bundled libxml2 to v2.10.3 to resolve multiple CVEs Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Improper neutralization of data URIs may allow XSS in rails-html-sanitizer Open
rails-html-sanitizer (1.3.0)
- Read upRead up
- Exclude checks
Possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer Open
rails-html-sanitizer (1.3.0)
- Read upRead up
- Exclude checks
Integer Overflow or Wraparound in libxml2 affects Nokogiri Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Improper Handling of Unexpected Data Type in Nokogiri Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Improper neutralization of data URIs may allow XSS in Loofah Open
loofah (2.5.0)
- Read upRead up
- Exclude checks
Update packaged dependency libxml2 from 2.9.10 to 2.9.12 Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Nokogiri::XML::Schema trusts input by default, exposing risk of an XXE vulnerability Open
nokogiri (1.10.9)
- Read upRead up
- Exclude checks
Regular Expression Denial of Service in Addressable templates Open
addressable (2.5.2)
- Read upRead up
- Exclude checks