Show filters
257 Total Results
Displaying 141-150 of 257
Sort by:
Attacker Value
Unknown

CVE-2021-23442

Disclosure Date: September 17, 2021 (last updated February 23, 2025)
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object.
Attacker Value
Unknown

CVE-2021-3805

Disclosure Date: September 17, 2021 (last updated February 23, 2025)
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-39205

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
Attacker Value
Unknown

CVE-2021-3666

Disclosure Date: September 13, 2021 (last updated February 23, 2025)
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3645

Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3766

Disclosure Date: September 06, 2021 (last updated February 23, 2025)
objection.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3757

Disclosure Date: September 02, 2021 (last updated February 23, 2025)
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-23421

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
Attacker Value
Unknown

CVE-2021-23419

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
Attacker Value
Unknown

CVE-2021-32811

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.