org.webjars.npm:vue-template-compiler@2.6.12 vulnerabilities

  • latest version

    2.6.14

  • first published

    8 years ago

  • latest version published

    3 years ago

  • licenses detected

    • [2.0.0-alpha.8,)
  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:vue-template-compiler package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Regular Expression Denial of Service (ReDoS)

org.webjars.npm:vue-template-compiler is a template compiler for Vue 2.0

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) through the parseHTML function in html-parser.ts. An attacker can cause the application to consume excessive resources by supplying a specially crafted input that triggers inefficient regular expression evaluation.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for org.webjars.npm:vue-template-compiler.

[0,)
  • M
Cross-site Scripting (XSS)

org.webjars.npm:vue-template-compiler is a template compiler for Vue 2.0

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the manipulation of object properties such as Object.prototype.staticClass or Object.prototype.staticStyle. An attacker can execute arbitrary JavaScript code by altering the prototype chain of these properties.

Note: This vulnerability is not present in Vue 3.

How to fix Cross-site Scripting (XSS)?

A fix was pushed into the master branch but not yet published.

[0,)