Description
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
Remediation
References
http://www.securityfocus.com/bid/95101
http://www.securitytracker.com/id/1037532
https://github.com/nahsra/antisamy/issues/2
Related Vulnerabilities
CVE-2021-3644 Vulnerability in maven package org.wildfly.core:wildfly-controller
CVE-2022-2466 Vulnerability in maven package io.quarkus:quarkus-smallrye-graphql
CVE-2022-25848 Vulnerability in npm package static-dev-server
CVE-2022-34113 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2022-43423 Vulnerability in maven package com.compuware.jenkins:compuware-scm-downloader