Lines 1-3
Link Here
|
|
|
1 |
<vuln vid="c3f5deb6-5f50-11ef-af54-a8a15998b5cb"> |
2 |
<topic>md4c_project -- Denial of service via a malformed Markdown document</topic> |
3 |
<affects> |
4 |
<package> |
5 |
<name>md4c</name> |
6 |
<range><eq>0.4.7</eq></range> |
7 |
</package> |
8 |
</affects> |
9 |
<description> |
10 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
11 |
<p>cve@mitre.org reports:</p> |
12 |
<blockquote cite="https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19"> |
13 |
<p>md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger |
14 |
use of uninitialized memory, and cause a denial of service via a |
15 |
malformed Markdown document.</p> |
16 |
</blockquote> |
17 |
</body> |
18 |
</description> |
19 |
<references> |
20 |
<cvename>CVE-2021-30027</cvename> |
21 |
<url>https://nvd.nist.gov/vuln/detail/CVE-2021-30027</url> |
22 |
</references> |
23 |
<dates> |
24 |
<discovery>2021-04-29</discovery> |
25 |
<entry>2024-08-21</entry> |
26 |
</dates> |
27 |
</vuln> |
28 |
|
1 |
<vuln vid="04c9c3f8-5ed3-11ef-8262-b0416f0c4c67"> |
29 |
<vuln vid="04c9c3f8-5ed3-11ef-8262-b0416f0c4c67"> |
2 |
<topic>Jinja2 -- Vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter</topic> |
30 |
<topic>Jinja2 -- Vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter</topic> |
3 |
<affects> |
31 |
<affects> |