Show filters
151 Total Results
Displaying 31-40 of 151
Sort by:
Attacker Value
Unknown

CVE-2021-23449

Disclosure Date: October 18, 2021 (last updated February 23, 2025)
This affects the package vm2 before 3.9.4 via a Prototype Pollution attack vector, which can lead to execution of arbitrary code on the host machine.
Attacker Value
Unknown

CVE-2021-23448

Disclosure Date: October 11, 2021 (last updated February 23, 2025)
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.
Attacker Value
Unknown

CVE-2021-41097

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.
Attacker Value
Unknown

CVE-2021-39227

Disclosure Date: September 17, 2021 (last updated February 23, 2025)
ZRender is a lightweight graphic library providing 2d draw for Apache ECharts. In versions prior to 5.2.1, using `merge` and `clone` helper methods in the `src/core/util.ts` module results in prototype pollution. It affects the popular data visualization library Apache ECharts, which uses and exports these two methods directly. The GitHub Security Advisory page for this vulnerability contains a proof of concept. This issue is patched in ZRender version 5.2.1. One workaround is available: Check if there is `__proto__` in the object keys. Omit it before using it as an parameter in these affected methods. Or in `echarts.util.merge` and `setOption` if project is using ECharts.
Attacker Value
Unknown

CVE-2021-23442

Disclosure Date: September 17, 2021 (last updated February 23, 2025)
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object.
Attacker Value
Unknown

CVE-2021-3805

Disclosure Date: September 17, 2021 (last updated February 23, 2025)
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-39205

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading.
Attacker Value
Unknown

CVE-2021-3666

Disclosure Date: September 13, 2021 (last updated February 23, 2025)
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3645

Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-3766

Disclosure Date: September 06, 2021 (last updated February 23, 2025)
objection.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')