tui-editor@1.2.0 vulnerabilities
GFM Markdown Wysiwyg Editor - Productive and Extensible
-
latest version
1.4.10
-
first published
7 years ago
-
latest version published
5 years ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the tui-editor package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Base tags are not sanitized which can be leveraged for XSS. How to fix Cross-site Scripting (XSS)? There is no fixed version for |
*
|
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
*
|
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Denial of Service (DoS) by typing: How to fix Denial of Service (DoS)? There is no fixed version for |
*
|
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When used in WYSIWYG only mode, it is affected by a persistent XSS which requires user interaction. The root cause is that How to fix Cross-site Scripting (XSS)? Upgrade |
<2.2.0
|
tui-editor is a GFM Markdown Wysiwyg Editor. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). JavaScript inserted into the editor is not sanitized by the library. PoC
How to fix Cross-site Scripting (XSS)? There is no fixed version for |
>=0.0.0
|