In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10006.json"
[ { "events": [ { "introduced": "0" }, { "fixed": "1.5.5" } ] }, { "events": [ { "introduced": "0" }, { "fixed": "1.5.5" } ] } ]