1.16.0
9 years ago
5 years ago
Known vulnerabilities in the org.webjars:prismjs package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars:prismjs is a lightweight, robust, elegant syntax highlighting library. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the PoC
How to fix Regular Expression Denial of Service (ReDoS)? A fix was pushed into the | [0,) |
org.webjars:prismjs is a lightweight, robust, elegant syntax highlighting library. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for | [0,) |
org.webjars:prismjs is a lightweight, robust, elegant syntax highlighting library. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for | [0,) |
org.webjars:prismjs is a lightweight, robust, elegant syntax highlighting library. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). The 'template-string'-Regexp is supposed to match a multiline string, meaning that if it doesn't find a match it will scan to the end of the file and then backtrack. Every backslash doubles the number of steps needed causing exponential growth and memory usage. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,1.5.0) |