Show filters
30 Total Results
Displaying 21-30 of 30
Sort by:
Attacker Value
Unknown

CVE-2020-28273

Disclosure Date: December 02, 2020 (last updated November 28, 2024)
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
Attacker Value
Unknown

CVE-2020-28267

Disclosure Date: November 10, 2020 (last updated November 28, 2024)
Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
Attacker Value
Unknown

CVE-2020-7715

Disclosure Date: September 01, 2020 (last updated February 22, 2025)
All versions of package deep-get-set are vulnerable to Prototype Pollution via the main function.
Attacker Value
Unknown

CVE-2019-15553

Disclosure Date: August 26, 2019 (last updated November 27, 2024)
An issue was discovered in the memoffset crate before 0.5.0 for Rust. offset_of and span_of can cause exposure of uninitialized memory.
0
Attacker Value
Unknown

CVE-2019-10747

Disclosure Date: August 23, 2019 (last updated November 08, 2023)
set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and _proto_ payloads.
Attacker Value
Unknown

CVE-2018-1000817

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
Asset Pipeline Grails Plugin Asset-pipeline plugin version Prior to 2.14.1.1, 2.15.1 and 3.0.6 contains a Incorrect Access Control vulnerability in Applications deployed in Jetty that can result in Download .class files and any arbitrary file. This attack appear to be exploitable via Specially crafted GET request containing directory traversal from assets-pipeline context. This vulnerability appears to have been fixed in 2.14.1.1 (for Grails 2.x), 2.15.1 (for Grails 3 and Java 7) and 3.0.6 (for Grails 3 and Java 8).
0
Attacker Value
Unknown

CVE-2018-17605

Disclosure Date: September 28, 2018 (last updated November 27, 2024)
An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.
0
Attacker Value
Unknown

CVE-2017-16098

Disclosure Date: June 07, 2018 (last updated November 26, 2024)
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
0
Attacker Value
Unknown

CVE-2016-10663

Disclosure Date: June 04, 2018 (last updated November 26, 2024)
wixtoolset is a Node module wrapper around the wixtoolset binaries wixtoolset downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Attacker Value
Unknown

CVE-2014-4991

Disclosure Date: January 10, 2018 (last updated November 26, 2024)
(1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.
0