Show filters
50 Total Results
Displaying 1-10 of 50
Sort by:
Attacker Value
Unknown

CVE-2020-26307

Disclosure Date: October 26, 2024 (last updated October 27, 2024)
HTML2Markdown is a Javascript implementation for converting HTML to Markdown text. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
0
Attacker Value
Unknown

CVE-2024-21535

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
Versions of the package markdown-to-jsx before 7.4.0 are vulnerable to Cross-site Scripting (XSS) via the src property due to improper input sanitization. An attacker can execute arbitrary code by injecting a malicious iframe element in the markdown.
Attacker Value
Unknown

CVE-2024-7739

Disclosure Date: August 13, 2024 (last updated September 14, 2024)
A vulnerability, which was classified as problematic, was found in yzane vscode-markdown-pdf 1.5.0. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2024-7738

Disclosure Date: August 13, 2024 (last updated September 14, 2024)
A vulnerability, which was classified as problematic, has been found in yzane vscode-markdown-pdf 1.5.0. Affected by this issue is some unknown functionality of the component Markdown File Handler. The manipulation leads to pathname traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2024-2319

Disclosure Date: March 08, 2024 (last updated February 26, 2025)
Cross-Site Scripting (XSS) vulnerability in the Django MarkdownX project, affecting version 4.0.2. An attacker could store a specially crafted JavaScript payload in the upload functionality due to lack of proper sanitisation of JavaScript elements.
0
Attacker Value
Unknown

CVE-2023-42821

Disclosure Date: September 22, 2023 (last updated February 25, 2025)
The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `0.0.0-20230922105210-14b16010c2ee`, which corresponds with commit `14b16010c2ee7ff33a940a541d993bd043a88940`, parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability. To exploit the vulnerability, parser needs to have `parser.Mmark` extension set. The panic occurs inside the `citation.go` file on the line 69 when the parser tries to access the element past its length. This can result in a denial of service. Commit `14b16010c2ee7ff33a940a541d993bd043a88940`/pseudoversion `0.0.0-20230922105210-14b16010c2ee` contains a patch for this issue.
Attacker Value
Unknown

CVE-2020-19952

Disclosure Date: August 11, 2023 (last updated February 25, 2025)
Cross Site Scripting (XSS) vulnerability in Rendering Engine in jbt Markdown Editor thru commit 2252418c27dffbb35147acd8ed324822b8919477, allows remote attackers to execute arbirary code via crafted payload or opening malicious .md file.
Attacker Value
Unknown

CVE-2023-0835

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
markdown-pdf version 11.0.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the Markdown content entered by the user.
Attacker Value
Unknown

CVE-2020-19947

Disclosure Date: March 16, 2023 (last updated February 24, 2025)
Cross Site Scripting vulnerability found in Markdown Edit allows a remote attacker to execute arbitrary code via the edit parameter of the webpage.
Attacker Value
Unknown

CVE-2023-1005

Disclosure Date: February 24, 2023 (last updated February 24, 2025)
A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability.