1.4.10
6 years ago
5 years ago
Known vulnerabilities in the tui-editor package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Base tags are not sanitized which can be leveraged for XSS. How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via How to fix Cross-site Scripting (XSS)? A fix was pushed into the | * |
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Denial of Service (DoS) by typing: How to fix Denial of Service (DoS)? There is no fixed version for | * |
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When used in WYSIWYG only mode, it is affected by a persistent XSS which requires user interaction. The root cause is that How to fix Cross-site Scripting (XSS)? Upgrade | <2.2.0 |
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). JavaScript inserted into the editor is not sanitized by the library. PoC
How to fix Cross-site Scripting (XSS)? There is no fixed version for | >=0.0.0 |