Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2022-21681

Disclosure Date: January 14, 2022 (last updated February 23, 2025)
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
Attacker Value
Unknown

CVE-2022-21680

Disclosure Date: January 14, 2022 (last updated February 23, 2025)
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
Attacker Value
Unknown

CVE-2021-21306

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user generated code through marked. This vulnerability is fixed in version 2.0.0.
Attacker Value
Unknown

CVE-2020-7682

Disclosure Date: July 25, 2020 (last updated February 21, 2025)
This affects all versions of package marked-tree. There is no path sanitization in the path provided at fs.readFile in index.js.
Attacker Value
Unknown

CVE-2014-3743

Disclosure Date: January 06, 2020 (last updated February 21, 2025)
Multiple cross-site scripting (XSS) vulnerabilities in the Marked module before 0.3.1 for Node.js allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) gfm codeblocks (language) or (2) javascript url's.
Attacker Value
Unknown

CVE-2017-16114

Disclosure Date: June 07, 2018 (last updated November 26, 2024)
The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.
0
Attacker Value
Unknown

CVE-2016-10531

Disclosure Date: May 31, 2018 (last updated November 26, 2024)
marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a `javascript:` URL. This flaw exists because `&#xNNanything;` gets parsed to what it could and leaves the rest behind, resulting in just `anything;` being left.
0
Attacker Value
Unknown

CVE-2018-6806

Disclosure Date: February 07, 2018 (last updated November 26, 2024)
Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
Attacker Value
Unknown

CVE-2017-1000427

Disclosure Date: January 02, 2018 (last updated November 08, 2023)
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
0
Attacker Value
Unknown

CVE-2015-8854

Disclosure Date: January 23, 2017 (last updated February 09, 2024)
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)."