There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.oracle.com/security-alerts/cpujul2020.html | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862 | issue tracking third party advisory patch |
https://snyk.io/vuln/npm:knockout:20180213 | third party advisory exploit |
https://www.oracle.com/security-alerts/cpujan2021.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |