4.1.0
10 years ago
1 days ago
Known vulnerabilities in the jspdf package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <4.1.0 |
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to Race Condition in the Note: This is only exploitable when used in a concurrent environment, e.g., on a Node.js web server. How to fix Race Condition? Upgrade | <4.1.0 |
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to XML Injection via the How to fix XML Injection? Upgrade | <4.1.0 |
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to External Control of File Name or Path via the How to fix External Control of File Name or Path? Upgrade | <4.0.0 |
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <3.0.2 |
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | <3.0.1 |
jspdf is a PDF Document creation from JavaScript Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). ReDoS is possible via the addImage function. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | <2.3.1 |