Show filters
50 Total Results
Displaying 31-40 of 50
Sort by:
Attacker Value
Unknown
CVE-2021-28796
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
Increments Qiita::Markdown before 0.33.0 allows XSS in transformers.
0
Attacker Value
Unknown
CVE-2021-26813
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
0
Attacker Value
Unknown
CVE-2020-7773
Disclosure Date: November 16, 2020 (last updated February 22, 2025)
This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = md() .use(markdownItHighlightjs, { inline: true }) .render('console.log(42){.">js}'); console.log(reuslt_xss);
0
Attacker Value
Unknown
CVE-2020-25821
Disclosure Date: September 23, 2020 (last updated February 22, 2025)
peg-markdown 0.4.14 has a NULL pointer dereference in process_raw_blocks in markdown_lib.c. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2020-5238
Disclosure Date: July 01, 2020 (last updated February 21, 2025)
The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This issue does not affect the upstream cmark project. The issue has been fixed in version 0.29.0.gfm.1.
0
Attacker Value
Unknown
CVE-2020-11888
Disclosure Date: April 20, 2020 (last updated February 21, 2025)
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
0
Attacker Value
Unknown
CVE-2009-3724
Disclosure Date: January 15, 2020 (last updated February 21, 2025)
python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.
0
Attacker Value
Unknown
CVE-2019-2904
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Oracle JDeveloper and ADF product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper and ADF. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper and ADF. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
0
Attacker Value
Unknown
CVE-2019-9844
Disclosure Date: April 09, 2019 (last updated November 08, 2023)
simple-markdown.js in Khan Academy simple-markdown before 0.4.4 allows XSS via a data: or vbscript: URI.
0
Attacker Value
Unknown
CVE-2018-1000874
Disclosure Date: December 20, 2018 (last updated November 08, 2023)
PHP cebe markdown parser version 1.2.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in all distributed parsers allowing a malicious crafted script to be executed that can result in the lose of user data and sensitive user information. This attack can be exploited by crafting a three backtick wrapped payload with a character in front: L: "```<script>alert();</script>```". NOTE: This has been argued as a non-issue (see references) since it is not the parser's job to sanitize malicious code from a parsed document
0