markdown-it@2.2.0 vulnerabilities
Markdown-it - modern pluggable markdown parser.
-
latest version
14.1.0
-
latest non vulnerable version
-
first published
10 years ago
-
latest version published
8 months ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the markdown-it package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
markdown-it is a modern pluggable markdown parser. Affected versions of this package are vulnerable to Infinite loop in linkify inline rule when using malformed input. How to fix Infinite loop? Upgrade |
<13.0.2
|
markdown-it is a modern pluggable markdown parser. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
<3.0.0
|
markdown-it is a modern pluggable markdown parser. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
<12.3.2
|
markdown-it is a modern pluggable markdown parser. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). Parsing __*_… takes quadratic time, this could be a denial of service vulnerability in an application that parses user input. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
<10.0.0
|
markdown-it is a pluggable markdown parser used for rendering markdown content to html. Affected versions of the package allowed the use of The fix was introduced in version Data URIs enable embedding small files in line in HTML documents, provided in the URL itself. Attackers can craft malicious web pages containing either HTML or script code that utilizes the data URI scheme, allowing them to bypass access controls or steal sensitive information. An example of data URI used to deliver javascript code. The data holds
How to fix Cross-site Scripting (XSS)? Upgrade to |
<4.1.0
|