Show filters
257 Total Results
Displaying 141-150 of 257
Sort by:
Attacker Value
Unknown
CVE-2021-23442
Disclosure Date: September 17, 2021 (last updated February 23, 2025)
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object.
0
Attacker Value
Unknown
CVE-2021-3805
Disclosure Date: September 17, 2021 (last updated February 23, 2025)
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-39205
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
0
Attacker Value
Unknown
CVE-2021-3666
Disclosure Date: September 13, 2021 (last updated February 23, 2025)
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-3645
Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-3766
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
objection.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-3757
Disclosure Date: September 02, 2021 (last updated February 23, 2025)
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-23421
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
0
Attacker Value
Unknown
CVE-2021-23419
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
0
Attacker Value
Unknown
CVE-2021-32811
Disclosure Date: August 02, 2021 (last updated February 23, 2025)
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
0