Show filters
231 Total Results
Displaying 91-100 of 231
Sort by:
Attacker Value
Unknown

CVE-2021-23497

Disclosure Date: February 04, 2022 (last updated February 23, 2025)
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
Attacker Value
Unknown

CVE-2022-0432

Disclosure Date: February 02, 2022 (last updated February 23, 2025)
Prototype Pollution in GitHub repository mastodon/mastodon prior to 3.5.0.
Attacker Value
Unknown

CVE-2021-23760

Disclosure Date: January 28, 2022 (last updated February 23, 2025)
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048)
Attacker Value
Unknown

CVE-2021-23558

Disclosure Date: January 28, 2022 (last updated February 23, 2025)
The package bmoor before 0.10.1 are vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
Attacker Value
Unknown

CVE-2021-23460

Disclosure Date: January 21, 2022 (last updated February 23, 2025)
The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types.
Attacker Value
Unknown

CVE-2021-23518

Disclosure Date: January 21, 2022 (last updated February 23, 2025)
The package cached-path-relative before 1.1.0 are vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573
Attacker Value
Unknown

CVE-2021-23594

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
Attacker Value
Unknown

CVE-2021-23568

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge.
Attacker Value
Unknown

CVE-2021-23543

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
Attacker Value
Unknown

CVE-2021-43852

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
OroPlatform is a PHP Business Application Platform. In affected versions by sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. This issue has been patched in version 4.2.8. Users unable to upgrade may configure a firewall to drop requests containing next strings: `__proto__` , `constructor[prototype]`, and `constructor.prototype` to mitigate this issue.