Page 2 of 10 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s Notification Manager API. The vulnerability exploits TinyMCE's unfiltered notification system, which is used in error handling. The conditions for this exploit requires carefully crafted malicious content to have been inserted into the editor and a notification to have been triggered. When a notification was opened, the HTML within the text argument was displayed unfiltered in the notification. • https://github.com/tinymce/tinymce/security/advisories/GHSA-hgqx-r2hp-jr38 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

tinymce is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user. This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements. • https://github.com/tinymce/tinymce/commit/6923d85eba6de3e08ebc9c5a387b5abdaa21150e https://github.com/tinymce/tinymce/commit/8bb2d2646d4e1a718fce61a775fa22e9d317b32d https://github.com/tinymce/tinymce/security/advisories/GHSA-gg8r-xjwq-4w92 https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes https://www.tiny.cloud/docs/tinymce/6/file-image-upload/#images_upload_handler • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

A cross-site scripting (XSS) vulnerability in TinyMCE 5.2.1 and earlier allows remote attackers to inject arbitrary web script when configured in classic editing mode. Una vulnerabilidad de tipo cross-site scripting (XSS) en TinyMCE versiones 5.2.1 y anteriores, permite a atacantes remotos inyectar script web arbitrario cuando se configuraba en el modo de edición clásica. • https://labs.bishopfox.com/advisories/tinymce-version-5.2.1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

TinyMCE before 4.9.7 and 5.x before 5.1.4 allows XSS in the core parser, the paste plugin, and the visualchars plugin by using the clipboard or APIs to insert content into the editor. TinyMCE versiones anteriores a 4.9.7 y versiones 5.x anteriores a 5.1.4, permite un ataque de tipo XSS en el analizador central, el plugin paste y el plugin visualchars mediante el uso del portapapeles o las API para insertar contenido en el editor • https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95 https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 2

tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab. tinymce versiones 4.7.11, 4.7.12, está afectada por: CWE-79: Neutralización Inapropiada de la Entrada Durante la Generación de Páginas Web. El impacto es: ejecución de código JavaScript. • https://github.com/ossf-cve-benchmark/CVE-2019-1010091 https://github.com/tinymce/tinymce/issues/4394 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •