org.webjars.npm:markdown-to-jsx@6.6.6 vulnerabilities
-
latest version
6.6.6
-
first published
6 years ago
-
latest version published
6 years ago
-
licenses detected
- [6.6.6,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:markdown-to-jsx package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.npm:markdown-to-jsx is a lightweight, customizable React markdown component. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.npm:markdown-to-jsx is a lightweight, customizable React markdown component. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). Catastrophic backtracking in the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,7.2.0)
|
org.webjars.npm:markdown-to-jsx is a lightweight, customizable React markdown component. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing data or VBScript URIs and a base64-encoded payload. How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.npm:markdown-to-jsx is a lightweight, customizable React markdown component. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to circumvent sanitisation and inject How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|