The vulnerability exists in the parse-server's cloud function dispatch mechanism, specifically within the src/triggers.js file. The functions getStore and get are responsible for resolving and retrieving cloud functions. The core of the vulnerability is that these functions used user-provided function names to traverse an internal object (_triggerStore) without validating that each part of the function name path was an 'own' property of the object. This allowed an attacker to craft a function name including properties like __proto__ or constructor, causing the code to traverse the JavaScript prototype chain. This prototype chain traversal could lead to a stack overflow, crashing the server. The provided patches fix this by adding Object.prototype.hasOwnProperty.call() checks in both getStore and get functions. This ensures that only the object's own properties are accessed, effectively preventing the prototype chain traversal and mitigating the denial-of-service vulnerability.