Vulnerabilities (CVE)

Filtered by CWE-1321
Total 317 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-1802 2 Google, Mozilla 4 Android, Firefox, Firefox Esr and 1 more 2022-12-29 N/A 8.8 HIGH
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
CVE-2022-2625 3 Fedoraproject, Postgresql, Redhat 3 Fedora, Postgresql, Enterprise Linux 2022-12-02 N/A 8.0 HIGH
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
CVE-2020-7637 1 Class-transformer Project 1 Class-transformer 2022-12-02 5.0 MEDIUM 5.3 MEDIUM
class-transformer before 0.3.1 allow attackers to perform Prototype Pollution. The classToPlainFromExist function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
CVE-2020-7600 1 Querymen Project 1 Querymen 2022-12-02 5.0 MEDIUM 5.3 MEDIUM
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.
CVE-2020-7638 1 Confinit Project 1 Confinit 2022-12-02 5.0 MEDIUM 5.3 MEDIUM
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
CVE-2020-7639 1 Dot Project 1 Dot 2022-12-02 5.0 MEDIUM 5.3 MEDIUM
eivindfjeldstad-dot below 1.0.3 is vulnerable to Prototype Pollution.The function 'set' could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
CVE-2020-7616 1 Express-mock-middleware Project 1 Express-mock-middleware 2022-12-02 5.0 MEDIUM 5.3 MEDIUM
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
CVE-2020-7618 1 Sds Project 1 Sds 2022-12-02 5.0 MEDIUM 5.3 MEDIUM
sds through 3.2.0 is vulnerable to Prototype Pollution.The library could be tricked into adding or modifying properties of the 'Object.prototype' by abusing the 'set' function located in 'js/set.js'.
CVE-2020-12079 1 Beakerbrowser 1 Beaker 2022-12-02 7.5 HIGH 10.0 CRITICAL
Beaker before 0.8.9 allows a sandbox escape, enabling system access and code execution. This occurs because Electron context isolation is not used, and therefore an attacker can conduct a prototype-pollution attack against the Electron internal messaging API.
CVE-2020-11066 1 Typo3 1 Typo3 2022-12-02 6.4 MEDIUM 10.0 CRITICAL
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, calling unserialize() on malicious user-submitted content can lead to modification of dynamically-determined object attributes and result in triggering deletion of an arbitrary directory in the file system, if it is writable for the web server. It can also trigger message submission via email using the identity of the web site (mail relay). Another insecure deserialization vulnerability is required to actually exploit mentioned aspects. This has been fixed in 9.5.17 and 10.4.2.
CVE-2020-7679 1 Casperjs 1 Casperjs 2022-12-02 7.5 HIGH 9.8 CRITICAL
In all versions of package casperjs, the mergeObjects utility function is susceptible to Prototype Pollution.
CVE-2020-7699 2 Express-fileupload Project, Netapp 2 Express-fileupload, Max Data 2022-12-02 7.5 HIGH 9.8 CRITICAL
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
CVE-2020-7700 1 Php.js Project 1 Php.js 2022-12-02 7.5 HIGH 9.8 CRITICAL
All versions of phpjs are vulnerable to Prototype Pollution via parse_str.
CVE-2020-7701 1 Springtree 1 Madlib-object-utils 2022-12-02 7.5 HIGH 9.8 CRITICAL
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
CVE-2020-7702 1 Templ8 Project 1 Templ8 2022-12-02 7.5 HIGH 9.8 CRITICAL
All versions of package templ8 are vulnerable to Prototype Pollution via the parse function.
CVE-2020-7703 1 Nis-utils Project 1 Nis-utils 2022-12-02 7.5 HIGH 9.8 CRITICAL
All versions of package nis-utils are vulnerable to Prototype Pollution via the setValue function.
CVE-2020-7704 1 Linux-cmdline Project 1 Linux-cmdline 2022-12-02 7.5 HIGH 9.8 CRITICAL
The package linux-cmdline before 1.0.1 are vulnerable to Prototype Pollution via the constructor.
CVE-2020-7706 1 Connie-lang Project 1 Connie-lang 2022-12-02 7.5 HIGH 9.8 CRITICAL
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.
CVE-2020-7707 1 Property-expr Project 1 Property-expr 2022-12-02 7.5 HIGH 9.8 CRITICAL
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
CVE-2020-7708 1 Irrelon 2 \@irrelon\/path, Irrelon-path 2022-12-02 7.5 HIGH 9.8 CRITICAL
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions.