Vulnerabilities (CVE)

Filtered by vendor Dart Subscribe
Filtered by product Dart Software Development Kit
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-0451 1 Dart 1 Dart Software Development Kit 2022-02-26 4.0 MEDIUM 6.5 MEDIUM
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.
CVE-2021-22540 1 Dart 1 Dart Software Development Kit 2021-04-26 4.3 MEDIUM 6.1 MEDIUM
Bad validation logic in the Dart SDK versions prior to 2.12.3 allow an attacker to use an XSS attack via DOM clobbering. The validation logic in dart:html for creating DOM nodes from text did not sanitize properly when it came across template tags.
CVE-2020-8923 1 Dart 1 Dart Software Development Kit 2020-03-31 4.3 MEDIUM 6.1 MEDIUM
An improper HTML sanitization in Dart versions up to and including 2.7.1 and dev versions 2.8.0-dev.16.0, allows an attacker leveraging DOM Clobbering techniques to skip the sanitization and inject custom html/javascript (XSS). Mitigation: update your Dart SDK to 2.7.2, and 2.8.0-dev.17.0 for the dev version. If you cannot update, we recommend you review the way you use the affected APIs, and pay special attention to cases where user-provided data is used to populate DOM nodes. Consider using Element.innerText or Node.text to populate DOM elements.