漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Misinterpretation of malicious XML input in xmldom
Vulnerability Description
xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Vulnerability Type
对输出编码和转义不恰当
Vulnerability Title
xmldom 安全漏洞
Vulnerability Description
Chris Brody xmldom是 (Chris Brody)开源的一个应用软件。W3C DOM的JavaScript实现,用于Node.js,Rhino和浏览器。 xmldom 0.6.0 及更早版本存在安全漏洞,该漏洞源于无法正确转义特殊字符。这可能会导致某些下游应用程序在 XML 处理期间出现意外的语法更改。
CVSS Information
N/A
Vulnerability Type
N/A