// CVE-2019-10756 (function(content) { content = content.replace(/<.*cript.*\/scrip.*>/gi, ""); // NOT OK content = content.replace(/ on\w+=".*"/g, ""); // NOT OK content = content.replace(/ on\w+=\'.*\'/g, ""); // NOT OK return content; }); (function(content) { content = content.replace(/<.*cript.*/gi, ""); // NOT OK content = content.replace(/.on\w+=.*".*"/g, ""); // NOT OK content = content.replace(/.on\w+=.*\'.*\'/g, ""); // NOT OK return content; }); // CVE-2020-7656 (function(responseText) { var rscript = /)<[^<]*)*<\/script>/gi; responseText.replace(rscript, ""); // NOT OK return responseText; }); // CVE-2019-1010091 (function(text) { text = text.replace(//gm, ""); // NOT OK x = x.replace(/\sng-[a-z-]+/, ""); // NOT OK x = x.replace(/\sng-[a-z-]+/g, ""); // NOT OK (ng-attributes) x = x.replace(/()/g, "\n"); // OK: not a sanitizer x = x.replace(//g, ""); // OK [INCONSISTENCY] x = x.replace(/