Skip to content

Commit

Permalink
Merge pull request #175 from github/bigopon-GHSA-m6j2-v3gq-45r5
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] authored Apr 4, 2022
2 parents 06eca2c + 1696ef5 commit 6540ed2
Showing 1 changed file with 11 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.2.0",
"id": "GHSA-m6j2-v3gq-45r5",
"modified": "2021-05-17T20:26:22Z",
"modified": "2022-04-02T12:53:44Z",
"published": "2022-02-10T23:42:39Z",
"aliases": [
"CVE-2019-10062"
Expand All @@ -23,6 +23,9 @@
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.1"
}
]
}
Expand All @@ -43,15 +46,19 @@
},
{
"type": "WEB",
"url": "https://discourse.aurelia.io/t/xss-vulnerability-in-htmlsanitizer-might-be-insufficiently-handled/4219"
"url": "https://github.com/aurelia/templating-resources/blob/0cef07a8cac8e99146d8e1c4b734491bb3dc4724/src/html-sanitizer.js"
},
{
"type": "WEB",
"url": "https://github.com/aurelia/templating-resources/blob/0cef07a8cac8e99146d8e1c4b734491bb3dc4724/src/html-sanitizer.js"
"url": "https://www.gosecure.net/blog/2021/05/12/aurelia-framework-insecure-default-allows-xss/"
},
{
"type": "WEB",
"url": "https://www.gosecure.net/blog/2021/05/12/aurelia-framework-insecure-default-allows-xss/"
"url": "https://discourse.aurelia.io/t/xss-vulnerability-in-htmlsanitizer-might-be-insufficiently-handled/4219"
},
{
"type": "PACKAGE",
"url": "https://github.com/aurelia/framework"
}
],
"database_specific": {
Expand Down

0 comments on commit 6540ed2

Please sign in to comment.