
CVE-2021-23472
- Reference to the description:
- Description:
- This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
- Last updated date:
- 01/23/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/05/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/05/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/05/2021
- Reference url to background
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/05/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/05/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/28/2021
- Reference url to background
https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597