Description
The package post-loader from 0.0.0 are vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1336 | The package post-loader from 0.0.0 are vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. |
Github GHSA |
GHSA-66ww-999q-mffq | Arbitrary code execution in post-loader |
References
| Link | Providers |
|---|---|
| https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737 |
|
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T00:52:18.366Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-0748
No data.
Status : Modified
Published: 2022-03-17T12:15:07.923
Modified: 2024-11-21T06:39:18.880
Link: CVE-2022-0748
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA