org.webjars.npm:highcharts@4.1.10 vulnerabilities
-
latest version
4.2.6
-
first published
8 years ago
-
latest version published
8 years ago
-
licenses detected
- [4.1.10,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:highcharts package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup. How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Prototype Pollution via the The impact depends on the application. In some cases, it is possible to achieve Denial of service (DoS), Remote Code Execution (or XSS) or Property Injection. How to fix Prototype Pollution? There is no fixed version for |
[0,)
|
org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|
org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). This can cause an impact of about 10 seconds matching time for data 200K characters long. How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for |
[0,)
|