org.webjars.npm:mathjax@2.7.0 vulnerabilities

  • latest version

    3.2.2

  • first published

    9 years ago

  • latest version published

    2 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:mathjax package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Regular Expression Denial of Service (ReDoS)

    org.webjars.npm:mathjax is an open-source JavaScript display engine for LaTeX, MathML, and AsciiMath notation that works in all modern browsers.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the components pattern and markdownPattern in MathJax.js. An attacker can cause a denial of service condition by crafting specific input that triggers inefficient regular expression evaluation. This is only exploitable if the regular expressions are applied to user input.

    Note:

    Users can't call these functions directly.

    How to fix Regular Expression Denial of Service (ReDoS)?

    There is no fixed version for org.webjars.npm:mathjax.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:mathjax is an open-source JavaScript display engine for LaTeX, MathML, and AsciiMath notation that works in all modern browsers.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the \unicode{} macro. This can result in potentially untrusted Javascript code running within a web browser. The exploit process must include the victim to view a page where the untrusted content is processed.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.npm:mathjax to version 2.7.5 or higher.

    [0,2.7.5)