-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerable dependencies #1813
Comments
Any solution to this? |
I believe marked has been updated to address that vulnerability, this repo would need a PR to update to the newer version. The json-pointer package has an open PR to address the Prototype Pollution vulnerability, but it appears to be blocked: manuelstofer/json-pointer#36 |
Hi folks! Any update updating this repo and There is a new vulnerability in We are unable to work around this one as we have in the past because it appears that As these are high severity vulnerabilities, any chance this could be looked into? Thanks! |
Bumping this for Someone has forked that repo and then published a "json-pointer-community" package with the vuln fixed in it. Is it possible for Redoc to switch to using the updated fork? Comment announcing the fork in original issue |
The owner of Linking @crenshaw-dev's PR: #1910 |
Looks like rc64 patches the issue? |
marked updated to |
seems it is resolved. If someone has questions/enhancements about that issue, please reopen it and let us know. Thanks. |
The following 2 dependencies used by redoc have security vulnerabilities:
marked Regular Expression Denial of Service (ReDoS)
CWE-1333
CVSS 5.9 MEDIUM
json-pointer Prototype Pollution
CWE-1321
CVE-2021-23820
CVSS 5.6
The text was updated successfully, but these errors were encountered: