Описание
Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.0 (включая)
cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 46%
0.00234
Низкий
7.3 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-94
CWE-94
Связанные уязвимости
EPSS
Процентиль: 46%
0.00234
Низкий
7.3 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-94
CWE-94