11.2.0
12 years ago
1 years ago
Known vulnerabilities in the org.webjars:highcharts package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup. How to fix Cross-site Scripting (XSS)? Upgrade | [,9.2.2) |
org.webjars:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Prototype Pollution via the The impact depends on the application. In some cases, it is possible to achieve Denial of service (DoS), Remote Code Execution (or XSS) or Property Injection. How to fix Prototype Pollution? Upgrade | [,9.2.2) |
org.webjars:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The How to fix Cross-site Scripting (XSS)? Upgrade | [,9.2.2) |