org.webjars.bowergithub.basecamp:trix@1.2.0 vulnerabilities
-
latest version
1.2.2
-
first published
5 years ago
-
latest version published
5 years ago
-
licenses detected
- [1.2.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.bowergithub.basecamp:trix package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.bowergithub.basecamp:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization of the How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bowergithub.basecamp:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization of pasted content from external sources into the editor. An attacker can execute arbitrary JavaScript code within the context of the user's session by embedding malicious scripts in the copied content. This is only exploitable if the Content Security Policy (CSP) does not adequately restrict inline scripts and external sources. How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bowergithub.basecamp:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.bowergithub.basecamp:trix is a Rich Text Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was possible to execute JavaScript on Trix Editor by pasting specially crafted HTML. How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|