2 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function. El paquete jointjs versiones anteriores a 3.3.0, son vulnerables a una Denegación de Servicio (DoS) por medio de la función unsetByPath • https://github.com/clientIO/joint/releases/tag/v3.3.0 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039 https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution. El paquete jointjs versiones anteriores a 3.3.0, es vulnerable a la contaminación de prototipos por medio de util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). La ruta usada para acceder a la clave del objeto y establecer el valor no está correctamente saneada, lo que conlleva a una Contaminación de Prototipo • https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150 https://github.com/clientIO/joint/pull/1406 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036 https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444 •