dompurify@0.7.2 vulnerabilities
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It's written in JavaScript and works in all modern browsers (Safari, Opera (15+), Internet Explorer (10+), Firefox and Chrome - as well as almost anything else usin
-
latest version
3.2.1
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
2 days ago
-
licenses detected
- (MPL-2.0 OR Apache-2.0)>=0.6.6
Direct Vulnerabilities
Known vulnerabilities in the dompurify package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Prototype Pollution due to improper checks of the properties during the HTML sanitization process. How to fix Prototype Pollution? Upgrade |
<2.4.2
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the improper sanitization of nested HTML elements in the How to fix Cross-site Scripting (XSS)? Upgrade |
<2.5.0
>=3.0.0 <3.1.3
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Prototype Pollution due to improper user input sanitization through the depth-checking mechanism, an attacker can exploit this vulnerability by using special nesting techniques to create a malicious HTML file. How to fix Prototype Pollution? Upgrade |
<2.5.4
>=3.0.0 <3.1.3
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Template Injection in How to fix Template Injection? Upgrade |
<2.4.9
>=3.0.0 <3.0.11
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Open Redirect in the How to fix Open Redirect? Upgrade |
<1.0.11
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This is due to a bypass of a previous XSS vulnerability. How to fix Cross-site Scripting (XSS)? Upgrade |
<2.2.3
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when converting from SVG namespace. How to fix Cross-site Scripting (XSS)? Upgrade |
<2.2.2
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This occurs because a How to fix Cross-site Scripting (XSS)? Upgrade |
<2.0.17
|
dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via innerHTML mutation XSS (mXSS) for an SVG element or a MATH element, as demonstrated by Chrome and Safari. How to fix Cross-site Scripting (XSS)? Upgrade |
<2.0.3
|
Affected versions of this package are vulnerable to a Cross-site Scripting (XSS) bug in Safari (>= versions 10.1). Specifically, when DOMPurify attempts to parse a string like:
it will result in XSS. How to fix Cross-site Scripting (XSS)? Upgrade |
<0.8.6
|