![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-21366 |
Description: | xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.4.0 and older do not correctly preserve system identifiers, FPIs or namespaces when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This is fixed in version 0.5.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.893260 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-21366 https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135 https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135 https://github.com/xmldom/xmldom/releases/tag/0.5.0 https://github.com/xmldom/xmldom/releases/tag/0.5.0 https://www.npmjs.com/package/xmldom https://www.npmjs.com/package/xmldom https://lists.debian.org/debian-lts-announce/2023/01/msg00000.html |