Update

reMarkable

reMarkable

to version 3.18.0

View all applications

CVE Vulnerabilities for reMarkable

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2019‑120432019‑05‑13 14:29:02MEDIUM (4)In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL.00NETWORK
CVE‑2019‑120412019‑05‑13 13:29:02HIGH (8)lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.44NETWORK
CVE‑2017‑160062018‑06‑04 19:29:01MEDIUM (4)Remarkable is a markdown parser. In versions 1.6.2 and lower, remarkable allows the use of `data:` URIs in links and can therefore execute javascript.00NETWORK
CVE‑2014‑100652018‑05‑31 20:29:00MEDIUM (4)Certain input when passed into remarkable before 1.4.1 will bypass the bad protocol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.00NETWORK

View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.