{"id":"CVE-2020-28479","details":"The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.","aliases":["GHSA-cq8r-fc3q-6hg2"],"modified":"2026-04-10T04:25:49.616157Z","published":"2021-01-19T15:15:11.870Z","related":["SNYK-JAVA-ORGWEBJARSBOWER-1062040","SNYK-JAVA-ORGWEBJARSNPM-1062039","SNYK-JS-JOINTJS-1062038"],"references":[{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038"},{"type":"ADVISORY","url":"https://github.com/clientIO/joint/releases/tag/v3.3.0"},{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040"},{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/clientIO/joint","events":[{"introduced":"0"},{"fixed":"fed63b3e37884ea1396faa7844bfc2075eb00cdf"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.3.0"}]}},{"type":"GIT","repo":"https://github.com/clientio/joint","events":[{"introduced":"0"},{"fixed":"fed63b3e37884ea1396faa7844bfc2075eb00cdf"}]}],"versions":["v0.4.1","v0.9.0","v0.9.1","v0.9.2","v0.9.3","v0.9.4","v0.9.5","v0.9.6","v0.9.7","v0.9.9","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.1.0","v2.0.0","v2.0.1","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v2.1.4","v2.2.0","v2.2.1","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.1","v3.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28479.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}