Known Vulnerabilities for products from Sanitize Project
Listed below are 4 of the newest known vulnerabilities associated with the vendor "Sanitize Project".
These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.
Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-35169 json | Not Provided | 2026-04-08 | 2026-04-08 | |
| CVE-2026-33742 json | Not Provided | 2026-03-26 | 2026-03-27 | |
| CVE-2026-33628 json | Not Provided | 2026-03-26 | 2026-03-27 | |
| CVE-2023-36823 json | Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitr... | 6.1 - MEDIUM | 2023-07-06 | 2023-11-14 |
| CVE-2023-23627 json | Sanitize is an allowlist-based HTML and CSS sanitizer. Versions 5.0.0 and later, prior to 6.0.1, are vulnerable to Cross-site... | 6.1 - MEDIUM | 2023-01-28 | 2023-02-06 |
| CVE-2020-4054 json | In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than 5.2.1, there is a cross-site scripting vulnerabil... | 7.3 - HIGH | 2020-06-16 | 2020-09-28 |
| CVE-2018-3740 json | A specially crafted HTML fragment can cause Sanitize gem for Ruby to allow non-whitelisted attributes to be used on a whiteli... | 7.5 - HIGH | 2018-03-30 | 2018-12-28 |
Known software with vulnerabilities from Sanitize Project
| Type | Vendor | Product | Version |
|---|---|---|---|
| Application | Sanitize Project | Sanitize | 1.0.0 |