Show filters
270 Total Results
Displaying 201-210 of 270
Sort by:
Attacker Value
Unknown

CVE-2021-25913

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
Prototype pollution vulnerability in 'set-or-get' version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
Attacker Value
Unknown

CVE-2021-21304

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
Dynamoose is an open-source modeling tool for Amazon's DynamoDB. In Dynamoose from version 2.0.0 and before version 2.7.0 there was a prototype pollution vulnerability in the internal utility method "lib/utils/object/set.ts". This method is used throughout the codebase for various operations throughout Dynamoose. We have not seen any evidence of this vulnerability being exploited. There is no evidence this vulnerability impacts versions 1.x.x since the vulnerable method was added as part of the v2 rewrite. This vulnerability also impacts v2.x.x beta/alpha versions. Version 2.7.0 includes a patch for this vulnerability.
Attacker Value
Unknown

CVE-2021-25912

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
Prototype pollution vulnerability in 'dotty' versions 0.0.1 through 0.1.0 allows attackers to cause a denial of service and may lead to remote code execution.
Attacker Value
Unknown

CVE-2021-23329

Disclosure Date: January 31, 2021 (last updated February 22, 2025)
The package nested-object-assign before 1.0.4 are vulnerable to Prototype Pollution via the default function, as demonstrated by running the PoC below.
0
Attacker Value
Unknown

CVE-2020-7771

Disclosure Date: January 04, 2021 (last updated February 22, 2025)
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
Attacker Value
Unknown

CVE-2020-28460

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
Attacker Value
Unknown

CVE-2020-28448

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
Attacker Value
Unknown

CVE-2020-28458

Disclosure Date: December 16, 2020 (last updated February 22, 2025)
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
Attacker Value
Unknown

CVE-2020-7792

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
0
Attacker Value
Unknown

CVE-2020-7788

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.