org.webjars.bower:tinymce@4.5.1 vulnerabilities
-
latest version
6.8.3
-
first published
9 years ago
-
latest version published
9 months ago
-
licenses detected
- [4.0.28,6.0.0)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.bower:tinymce package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when using the How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when parsing How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-Site Scripting (XSS) via How to fix Cross-Site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when loading SVG files via How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via mutation of inner HTML. An attacker can inject malicious scripts that pass the initial sanitization layer when the content is parsed into the editor body, but can trigger XSS when the special internal marker is removed from the content and re-parsed. Text nodes in some parents are not sufficiently escaped upon serialization and can contain a special character reserved as an internal marker. How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.10.9)
[6.0.0,6.7.3)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the core How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.10.8)
[6.0.0,6.7.1)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.10.8)
[6.0.0,6.7.2)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.10.7)
[6.0.0,6.3.1)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via URLs which are not cleaned correctly in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.10.2)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a piece of crafted content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.9.2)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs, and then submitting the form. However, as TinyMCE does not allow forms to be submitted while editing, the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. NOTE: the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.8.2)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A vulnerability exists within the URL sanitization logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs. How to fix Cross-site Scripting (XSS)? Upgrade |
[0,5.6.1)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade |
(4.9.10,5.2.2)
[,4.9.10)
|
org.webjars.bower:tinymce is a WebJar for tinymce. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the core parser, paste and How to fix Cross-site Scripting (XSS)? Upgrade |
[,5.1.6)
|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks. Links with How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.7.12)
|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks, due to not encoding the base url passed into the iframe contents in the preview plugin. How to fix Cross-site Scripting (XSS)? Upgrade |
[,4.6.4)
|