{"uuid": "82fdf3d9-84f5-48ec-a0ae-4d8cb7650209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46308", "type": "seen", "source": "https://t.me/cibsecurity/74274", "content": "\u203c\ufe0fCVE-2023-46308\u203c\ufe0f\n\nIn Plotly plotly.js before 2.25.2, plot API calls have a risk of proto being polluted in expandObjectPaths or nestedProperty.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:32:05.000000Z"}