CVE-2018-25110
- EPSS 0.22%
- Published 23.05.2025 14:53:43
- Last modified 13.08.2025 15:42:28
Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerab...
CVE-2022-21680
- EPSS 0.49%
- Published 14.01.2022 17:15:13
- Last modified 21.11.2024 06:45:13
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markd...
CVE-2022-21681
- EPSS 0.48%
- Published 14.01.2022 17:15:13
- Last modified 21.11.2024 06:45:13
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown throug...
CVE-2021-21306
- EPSS 0.6%
- Published 08.02.2021 22:15:12
- Last modified 21.11.2024 05:47:59
Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user gen...
CVE-2014-3743
- EPSS 0.58%
- Published 06.01.2020 20:15:11
- Last modified 21.11.2024 02:08:45
Multiple cross-site scripting (XSS) vulnerabilities in the Marked module before 0.3.1 for Node.js allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) gfm codeblocks (language) or (2) javascript url's.
CVE-2017-16114
- EPSS 0.27%
- Published 07.06.2018 02:29:02
- Last modified 21.11.2024 03:15:50
The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.
CVE-2016-10531
- EPSS 0.29%
- Published 31.05.2018 20:29:01
- Last modified 21.11.2024 02:44:12
marked is an application that is meant to parse and compile markdown. Due to the way that marked 0.3.5 and earlier parses input, specifically HTML entities, it's possible to bypass marked's content injection protection (`sanitize: true`) to inject a ...
CVE-2017-1000427
- EPSS 0.28%
- Published 02.01.2018 23:29:00
- Last modified 21.11.2024 03:04:43
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
CVE-2015-8854
- EPSS 1.02%
- Published 23.01.2017 21:59:00
- Last modified 20.04.2025 01:37:25
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (...
CVE-2015-1370
- EPSS 0.35%
- Published 27.01.2015 20:04:27
- Last modified 12.04.2025 10:46:40
Incomplete blacklist vulnerability in marked 0.3.2 and earlier for Node.js allows remote attackers to conduct cross-site scripting (XSS) attacks via a vbscript tag in a link.