Total
317 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-1802 | 2 Google, Mozilla | 4 Android, Firefox, Firefox Esr and 1 more | 2022-12-29 | N/A | 8.8 HIGH |
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. | |||||
CVE-2022-2625 | 3 Fedoraproject, Postgresql, Redhat | 3 Fedora, Postgresql, Enterprise Linux | 2022-12-02 | N/A | 8.0 HIGH |
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | |||||
CVE-2020-7637 | 1 Class-transformer Project | 1 Class-transformer | 2022-12-02 | 5.0 MEDIUM | 5.3 MEDIUM |
class-transformer before 0.3.1 allow attackers to perform Prototype Pollution. The classToPlainFromExist function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | |||||
CVE-2020-7600 | 1 Querymen Project | 1 Querymen | 2022-12-02 | 5.0 MEDIUM | 5.3 MEDIUM |
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks. | |||||
CVE-2020-7638 | 1 Confinit Project | 1 Confinit | 2022-12-02 | 5.0 MEDIUM | 5.3 MEDIUM |
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. | |||||
CVE-2020-7639 | 1 Dot Project | 1 Dot | 2022-12-02 | 5.0 MEDIUM | 5.3 MEDIUM |
eivindfjeldstad-dot below 1.0.3 is vulnerable to Prototype Pollution.The function 'set' could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. | |||||
CVE-2020-7616 | 1 Express-mock-middleware Project | 1 Express-mock-middleware | 2022-12-02 | 5.0 MEDIUM | 5.3 MEDIUM |
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk. | |||||
CVE-2020-7618 | 1 Sds Project | 1 Sds | 2022-12-02 | 5.0 MEDIUM | 5.3 MEDIUM |
sds through 3.2.0 is vulnerable to Prototype Pollution.The library could be tricked into adding or modifying properties of the 'Object.prototype' by abusing the 'set' function located in 'js/set.js'. | |||||
CVE-2020-12079 | 1 Beakerbrowser | 1 Beaker | 2022-12-02 | 7.5 HIGH | 10.0 CRITICAL |
Beaker before 0.8.9 allows a sandbox escape, enabling system access and code execution. This occurs because Electron context isolation is not used, and therefore an attacker can conduct a prototype-pollution attack against the Electron internal messaging API. | |||||
CVE-2020-11066 | 1 Typo3 | 1 Typo3 | 2022-12-02 | 6.4 MEDIUM | 10.0 CRITICAL |
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, calling unserialize() on malicious user-submitted content can lead to modification of dynamically-determined object attributes and result in triggering deletion of an arbitrary directory in the file system, if it is writable for the web server. It can also trigger message submission via email using the identity of the web site (mail relay). Another insecure deserialization vulnerability is required to actually exploit mentioned aspects. This has been fixed in 9.5.17 and 10.4.2. | |||||
CVE-2020-7679 | 1 Casperjs | 1 Casperjs | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
In all versions of package casperjs, the mergeObjects utility function is susceptible to Prototype Pollution. | |||||
CVE-2020-7699 | 2 Express-fileupload Project, Netapp | 2 Express-fileupload, Max Data | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. | |||||
CVE-2020-7700 | 1 Php.js Project | 1 Php.js | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
All versions of phpjs are vulnerable to Prototype Pollution via parse_str. | |||||
CVE-2020-7701 | 1 Springtree | 1 Madlib-object-utils | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue. | |||||
CVE-2020-7702 | 1 Templ8 Project | 1 Templ8 | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package templ8 are vulnerable to Prototype Pollution via the parse function. | |||||
CVE-2020-7703 | 1 Nis-utils Project | 1 Nis-utils | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package nis-utils are vulnerable to Prototype Pollution via the setValue function. | |||||
CVE-2020-7704 | 1 Linux-cmdline Project | 1 Linux-cmdline | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The package linux-cmdline before 1.0.1 are vulnerable to Prototype Pollution via the constructor. | |||||
CVE-2020-7706 | 1 Connie-lang Project | 1 Connie-lang | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie. | |||||
CVE-2020-7707 | 1 Property-expr Project | 1 Property-expr | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function. | |||||
CVE-2020-7708 | 1 Irrelon | 2 \@irrelon\/path, Irrelon-path | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions. |