Show filters
50 Total Results
Displaying 11-20 of 50
Sort by:
Attacker Value
Unknown
CVE-2023-26303
Disclosure Date: February 23, 2023 (last updated February 24, 2025)
Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
0
Attacker Value
Unknown
CVE-2023-26302
Disclosure Date: February 22, 2023 (last updated February 24, 2025)
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
0
Attacker Value
Unknown
CVE-2019-25103
Disclosure Date: February 12, 2023 (last updated February 24, 2025)
A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The patch is named 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639.
0
Attacker Value
Unknown
CVE-2019-25102
Disclosure Date: February 12, 2023 (last updated February 24, 2025)
A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The patch is identified as 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2015-10005
Disclosure Date: December 27, 2022 (last updated February 24, 2025)
A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file lib/common/html_re.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c8620157d6e38f9872811620d25138fc9d1b0d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216852.
0
Attacker Value
Unknown
CVE-2022-45026
Disclosure Date: December 07, 2022 (last updated February 24, 2025)
An issue in Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom allows attackers to execute arbitrary commands during the GFM export process.
0
Attacker Value
Unknown
CVE-2022-45025
Disclosure Date: December 07, 2022 (last updated February 24, 2025)
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
0
Attacker Value
Unknown
CVE-2022-41710
Disclosure Date: November 03, 2022 (last updated February 24, 2025)
Markdownify version 1.4.1 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Markdownify. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.
0
Attacker Value
Unknown
CVE-2022-41709
Disclosure Date: October 19, 2022 (last updated October 08, 2023)
Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled.
0
Attacker Value
Unknown
CVE-2022-38639
Disclosure Date: September 09, 2022 (last updated February 24, 2025)
A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field.
0