2.5.3
16 years ago
2 months ago
Known vulnerabilities in the markdown2 package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the _do_link_patterns method within the Markdown class in How to fix Cross-site Scripting (XSS)? Upgrade | [,2.5.1) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) within the Markdown class in lib/markdown2.py, which insufficiently sanitizes attribute values. An attacker can exploit this by crafting specially formatted markdown input containing HTML tags with malicious attributes. How to fix Cross-site Scripting (XSS)? Upgrade | [,2.5.1) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization for nested incomplete tags. How to fix Cross-site Scripting (XSS)? Upgrade | [,2.4.4) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regex How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.4.11) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) which bypass on any How to fix Cross-site Scripting (XSS)? Upgrade | [0,2.4.4) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper usage of regex via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.4.3) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via auto linking url. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.4.2) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the PoC:
How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,2.4.1) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, it is possible to make PoC
How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [1.0.1.18,2.4.0) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Cross Site Scripting (XSS) via How to fix Cross Site Scripting (XSS)? Upgrade | [,2.3.9) |
markdown2 is a fast and complete Python implementation of Markdown. Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
Element names are mishandled unless a How to fix Cross-site Scripting (XSS)? Upgrade | [0,2.3.9) |
Affected versions of the package are vulnerable to Cross-site Scripting (XSS) attacks via the PoC by Vineet Kumar
How to fix Cross-site Scripting (XSS)? Upgrade | [,2.3.7) |