Show filters
50 Total Results
Displaying 21-30 of 50
Sort by:
Attacker Value
Unknown

CVE-2022-31175

Disclosure Date: August 03, 2022 (last updated February 24, 2025)
CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `<textarea>` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of inte…
Attacker Value
Unknown

CVE-2020-28455

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
This affects all versions of package markdown-it-toc. The title of the generated toc and the contents of the header are not escaped.
Attacker Value
Unknown

CVE-2020-28459

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
This affects all versions of package markdown-it-decorate. An attacker can add an event handler or use javascript:xxx for the link.
Attacker Value
Unknown

CVE-2021-43308

Disclosure Date: May 29, 2022 (last updated February 23, 2025)
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function
Attacker Value
Unknown

CVE-2022-21670

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.
Attacker Value
Unknown

CVE-2021-23639

Disclosure Date: December 10, 2021 (last updated October 07, 2023)
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
Attacker Value
Unknown

CVE-2021-37700

Disclosure Date: August 12, 2021 (last updated February 23, 2025)
@github/paste-markdown is an npm package for pasting markdown objects. A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown before version 0.3.4. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. This is fixed in version 0.3.4. Refer the to the referenced GitHub Advisory for more details including an example exploit.
Attacker Value
Unknown

CVE-2021-28833

Disclosure Date: June 21, 2021 (last updated February 22, 2025)
Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.
Attacker Value
Unknown

CVE-2021-21660

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
Jenkins Markdown Formatter Plugin 0.1.0 and earlier does not sanitize crafted link target URLs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.
Attacker Value
Unknown

CVE-2021-21391

Disclosure Date: April 29, 2021 (last updated February 22, 2025)
CKEditor 5 provides a WYSIWYG editing solution. This CVE affects the following npm packages: ckeditor5-engine, ckeditor5-font, ckeditor5-image, ckeditor5-list, ckeditor5-markdown-gfm, ckeditor5-media-embed, ckeditor5-paste-from-office, and ckeditor5-widget. Following an internal audit, a regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. The problem has been recognized and patched. The fix will be available in version 27.0.0.