A vulnerability was found in jointjs Package up to 3.4.1. It has been declared as critical. This vulnerability affects the function setByPath
of the component Parameter Handler. Upgrading to version 3.4.2 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch e5bf89efef6d5ea572d66870ffd86560de7830a8 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
jointjs Package up to 3.4.1 Parameter setByPath path type confusion
- Virtual Patching
- September 21, 2021
- 9:04 pm
CVE-2023-3065 : MOBATIME AMXGT100 UP TO 1.3.20 IMPROPER AUTHENTICATION
Description Improper Authentication vulnerability in Mobatime mobile application AMXGT100 allows Authentication Bypass.This issue affects Mobatime mobile application AMXGT100 through 1.3.20.
CVE-2023-2781 : USER EMAIL VERIFICATION FOR WOOCOMMERCE PLUGIN UP TO 3.5.0 ON WORDPRESS IMPROPER AUTHENTICATION
Description The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up
CVE-2023-33965 : BROOK PRIOR 20230606 TPROXY SERVER OS COMMAND INJECTION
Description Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker