### [CVE-2019-14862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14862) ![](https://img.shields.io/static/v1?label=Product&message=knockout&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79&color=brighgreen) ### Description There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuapr2022.html - https://www.oracle.com/security-alerts/cpuapr2022.html - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpujul2020.html #### Github - https://github.com/ossf-cve-benchmark/CVE-2019-14862