Open tsunez opened 3 years ago
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Issue still exists.
Issue has 1 vulnerability/vulnerabilities left to be fixed (Please scroll to the top for more information)
Client_Potential_ReDoS_In_Replace issue exists @ public/assets/showdown.min.js in branch master
The application uses a dangerous regex pattern "/((^ {0,3}>[ \t]?.+\n(.+\n)\n)+)/gm", at line 3 of public\assets\showdown.min.js, to search and compare user input with RegExp, at line 3 of public\assets\showdown.min.js.
Severity: Low
CWE:400
Vulnerability details and guidance
Checkmarx
Recommended Fix
Lines: 3
Code (Line #3):