We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
Reserved 2023-12-22 | Published 2024-11-13 | Updated 2025-01-16 | Assigner snykNodeMedic-FINE
security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199
security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8383166
github.com/...ommit/9e0e0fad5a251de5b42feb326c4204eb04080805
Support options