Published: 26/01/2021 Updated: 30/01/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A specially crafted Markdown document could cause the execution of malicious JavaScript code in Caret Editor prior to 4.0.0-rc22.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

caret caret

caret caret 4.0.0

Mailing Lists

Details ================ Product: Caret Editor Product URL: caretio/ Vendor: Caretio Ltd Vulnerability: Remote Code Execution Vulnerable version: Caret Editor v400-rc21 Fixed version: Caret Editor v400-rc22 CVE Number: CVE-2020-20269 CVE URL: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2020-20269 Author: Manuel Bua (dudez) ...