Show filters
124 Total Results
Displaying 11-20 of 124
Sort by:
Attacker Value
Unknown

CVE-2021-3666

Disclosure Date: September 13, 2021 (last updated February 23, 2025)
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3645

Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3766

Disclosure Date: September 06, 2021 (last updated February 23, 2025)
objection.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3757

Disclosure Date: September 02, 2021 (last updated February 23, 2025)
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-23421

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
Attacker Value
Unknown

CVE-2021-23419

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
Attacker Value
Unknown

CVE-2021-32811

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
Attacker Value
Unknown

CVE-2021-32807

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. The problem has been fixed in AccessCo…
Attacker Value
Unknown

CVE-2021-23417

Disclosure Date: July 28, 2021 (last updated February 23, 2025)
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
Attacker Value
Unknown

CVE-2021-23408

Disclosure Date: July 21, 2021 (last updated February 23, 2025)
This affects the package com.graphhopper:graphhopper-web-bundle before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload.