org.webjars.bower:tui-editor@1.4.10 vulnerabilities
-
latest version
1.4.10
-
first published
6 years ago
-
latest version published
4 years ago
-
licenses detected
- [1.1.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.bower:tui-editor package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.bower:tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Base tags are not sanitized which can be leveraged for XSS. How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.bower:tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.bower:tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Denial of Service (DoS) by typing: How to fix Denial of Service (DoS)? There is no fixed version for |
[0,)
|
org.webjars.bower:tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When used in WYSIWYG only mode, it is affected by a persistent XSS which requires user interaction. The root cause is that How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.2.0)
|
org.webjars.bower:tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). JavaScript inserted into the editor is not sanitized by the library. PoC
How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0.0.0,)
|