Marky 0.0.1 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into markdown files. Attackers can upload crafted markdown files with embedded JavaScript payloads that execute when the file is opened, potentially enabling remote code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vesparny
Vesparny marky |
|
| Vendors & Products |
Vesparny
Vesparny marky |
Sat, 17 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 16 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Marky 0.0.1 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into markdown files. Attackers can upload crafted markdown files with embedded JavaScript payloads that execute when the file is opened, potentially enabling remote code execution. | |
| Title | Marky 0.0.1 - Persistent Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-16T19:09:37.915Z
Updated: 2026-01-16T21:09:40.977Z
Reserved: 2026-01-14T17:11:19.901Z
Link: CVE-2021-47839
Updated: 2026-01-16T21:00:20.315Z
Status : Received
Published: 2026-01-16T19:16:09.537
Modified: 2026-01-16T22:16:17.330
Link: CVE-2021-47839