Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3277 | Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. |
Github GHSA |
GHSA-jrvm-mcxc-mf6m | dom-iterator code execution vulnerability |
Tue, 14 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. | Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. |
| References |
| |
| Metrics |
cvssV4_0
|
Tue, 19 Nov 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Matthewmueller
Matthewmueller dom-iterator |
|
| CPEs | cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Matthewmueller
Matthewmueller dom-iterator |
Thu, 14 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dom-iterator
Dom-iterator dom-iterator |
|
| CPEs | cpe:2.3:a:dom-iterator:dom-iterator:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dom-iterator
Dom-iterator dom-iterator |
|
| Metrics |
ssvc
|
Wed, 13 Nov 2024 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-01-16T11:24:30.637Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21541
Updated: 2024-11-14T16:04:20.796Z
Status : Modified
Published: 2024-11-13T05:15:14.680
Modified: 2026-04-29T01:00:01.613
Link: CVE-2024-21541
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA