The package post-loader from 0.0.0 are vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2022-03-17T00:00:00
Updated: 2022-03-17T11:21:01
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-0748
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-17T12:15:07.923
Modified: 2023-08-08T14:22:24.967
Link: CVE-2022-0748
JSON object: View
Redhat Information
No data.
CWE