Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Github GHSA | 
                GHSA-v638-q856-grg8 | MathJax Regular expression Denial of Service (ReDoS) | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://github.com/mathjax/MathJax/issues/3074 | 
                     | 
            
History
                    Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-02T13:23:58.981Z
Reserved: 2023-08-07T00:00:00
Link: CVE-2023-39663
Updated: 2024-08-02T18:18:09.624Z
Status : Modified
Published: 2023-08-29T20:15:09.990
Modified: 2024-11-21T08:15:47.080
Link: CVE-2023-39663
No data.
                        OpenCVE Enrichment
                    No data.
 Github GHSA