Show filters
133 Total Results
Displaying 21-30 of 133
Sort by:
Attacker Value
Unknown
CVE-2021-3645
Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-3766
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
objection.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-3757
Disclosure Date: September 02, 2021 (last updated February 23, 2025)
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-23421
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
0
Attacker Value
Unknown
CVE-2021-23419
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
0
Attacker Value
Unknown
CVE-2021-32811
Disclosure Date: August 02, 2021 (last updated February 23, 2025)
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
0
Attacker Value
Unknown
CVE-2021-32807
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to Python modules and only exempt a few that are deemed safe, such as Python's `string` module. However, full access to the `string` module also allows access to the class `Formatter`, which can be overridden and extended within `Script (Python)` in a way that provides access to other unsafe Python libraries. Those unsafe Python libraries can be used for remote code execution. By default, you need to have the admin-level Zope "Manager" role to add or edit `Script (Python)` objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk. The problem has been fixed in AccessCo…
0
Attacker Value
Unknown
CVE-2021-23417
Disclosure Date: July 28, 2021 (last updated February 23, 2025)
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
0
Attacker Value
Unknown
CVE-2021-23408
Disclosure Date: July 21, 2021 (last updated February 23, 2025)
This affects the package com.graphhopper:graphhopper-web-bundle before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload.
0
Attacker Value
Unknown
CVE-2021-25953
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.
0