1.4.0
10 years ago
10 years ago
Known vulnerabilities in the org.webjars:remarkable package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars:remarkable is a markdown parsing library written in Javascript. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for | [0,) |
org.webjars:remarkable is a markdown parsing library written in Javascript. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allowed the use of Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information. An example of data URI used to deliver javascript code. The data holds
How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
org.webjars:remarkable is a markdown parsing library written in Javascript. Affected versions of this package are vulnerable to Content Injection. Certain input when passed into remarkable will bypass the bad prototcol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content. How to fix Content Injection? There is no fixed version for | [0,) |