Issues
- 0
Dependency Dashboard
#89 opened by renovate - 1
Vulnerability found
#155 opened by plakidan - 1
Issue with sanitising XSS on Base64 encoded strings with trailing double equal (==) signs
#151 opened by EricSocs - 1
False positive: "system ("
#150 opened by friggingee - 0
Please add big warning that this package should not be included in any non-UTF-8 application or package dependency
#148 opened by cmanley - 0
Fix failing test "testSvgXssFileV1"
#147 opened by Chris53897 - 0
JSON Encoded HTML attribute issues
#143 opened by breconwhite - 0
Example 6 returns unexpected false in isXssFound()
#141 opened by banakito - 3
False positive 'abc < abcd'
#134 opened by timmit-nl - 0
Why is my output different from your example
#135 opened by ken678 - 0
False postive "Behavior:"
#129 opened by attrib - 1
Just question about htmlspecialchars and this
#128 opened by Pok4 - 1
style=foo:expres\sion(1058+{valueOf:alert})} and style=color:expres\sion(1834+{toString:alert} XSS Issue
#126 opened by psinghracknap - 2
performance investigation
#64 opened by staabm - 1
The style attribute preserves the question.
#71 opened by isszz - 2
False positive on closed sorce tag.
#111 opened by genetus - 1
false positive on name
#113 opened by f17208 - 1
xss_clean bypass (false negative) on javascript context
#115 opened by thanosgn - 1
JavaScript keywords will be removed in pre/code tag
#102 opened by paxter - 2
false positive in url geolocation.com
#114 opened by alechner - 0
- 4
False positive for "wordContainingFile(" in `_sanitize_naughty_javascript`
#99 opened by Fahl-Design - 0
- 5
False positive for Document.aspx in link
#95 opened by adam-boduch - 3
isXssFound() returns false if xss string was found in array value that is not the last one.
#75 opened by dlt- - 1
XSS in Angular and AngularJS
#93 opened by Brenneisen - 7
The content of the code block submitted by the editor will be added with additional line breaks
#72 opened by isszz - 1
All Post and GET Celan
#92 opened by sanater - 3
False positive on < 1 year
#83 opened by mathiasselleslach - 4
- 4
It gives errors in large strings.
#80 opened by hsdmr - 1
False positive in string < 35%
#78 opened by timmit-nl - 2
Cannot properly install
#79 opened by FinnAlberts - 0
Can I use it in commercial software?
#76 opened by MichaelXieShao - 0
- 0
- 0
- 0
- 2
False positive in string <35%
#62 opened by timmit-nl - 2
How allow some condition html content
#63 opened by Mech-Statham - 2
Allow base64 in img failds
#61 opened by danielspk - 2
False positive in string
#60 opened by Anyqax - 3
img's src="data:image/png;base64," be deleted
#59 opened by 1261466029 - 2
Possibly inconsistent escaping
#58 opened by andrei-dascalu - 2
- 2
Escaped <script> tags are removed
#56 opened by gharlan - 1
Wrong result for escaped html inside `<pre>`
#55 opened by gharlan - 1
False positive for "on.." prefix in URL
#54 opened by denisbondar - 2
False positive for (0) in URL
#53 opened by denisbondar - 1
Additional false positives in string
#52 opened by rafaelmaiolla