Vulnerabilities (CVE)

Filtered by CWE-1321
Total 385 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-36632 1 Flat Project 1 Flat 2024-11-21 N/A 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability.
CVE-2020-36618 1 Furqansofware 1 Node Whois 2024-11-21 N/A 6.3 MEDIUM
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.
CVE-2020-28471 1 Properties-reader Project 1 Properties-reader 2024-11-21 N/A 7.3 HIGH
This affects the package properties-reader before 2.2.0.
CVE-2020-28462 1 Ion-parser Project 1 Ion-parser 2024-11-21 N/A 7.3 HIGH
This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-28461 1 Js-ini Project 1 Js-ini 2024-11-21 N/A 7.3 HIGH
This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-28460 1 Multi-ini Project 1 Multi-ini 2024-11-21 7.5 HIGH 5.6 MEDIUM
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
CVE-2020-28458 1 Datatables 1 Datatables.net 2024-11-21 7.5 HIGH 7.3 HIGH
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
CVE-2020-28448 1 Multi-ini Project 1 Multi-ini 2024-11-21 7.5 HIGH 5.6 MEDIUM
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
CVE-2020-28441 1 Conf-cfg-ini Project 1 Conf-cfg-ini 2024-11-21 N/A 7.3 HIGH
This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-28271 1 Deephas Project 1 Deephas 2024-11-21 7.5 HIGH 9.8 CRITICAL
Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28270 1 Mjpclab 1 Object-hierarchy-access 2024-11-21 7.5 HIGH 9.8 CRITICAL
Prototype pollution vulnerability in 'object-hierarchy-access' versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28269 1 Exodus 1 Field 2024-11-21 7.5 HIGH 9.8 CRITICAL
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28268 1 Controlled-merge Project 1 Controlled-merge 2024-11-21 5.0 MEDIUM 7.5 HIGH
Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-24939 1 Stampit 1 Supermixer 2024-11-21 5.0 MEDIUM 7.5 HIGH
Prototype pollution in Stampit supermixer 1.0.3 allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
CVE-2020-15366 1 Ajv.js 1 Ajv 2024-11-21 6.8 MEDIUM 5.6 MEDIUM
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
CVE-2020-12079 1 Beakerbrowser 1 Beaker 2024-11-21 7.5 HIGH 10.0 CRITICAL
Beaker before 0.8.9 allows a sandbox escape, enabling system access and code execution. This occurs because Electron context isolation is not used, and therefore an attacker can conduct a prototype-pollution attack against the Electron internal messaging API.
CVE-2020-11066 1 Typo3 1 Typo3 2024-11-21 6.4 MEDIUM 8.7 HIGH
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, calling unserialize() on malicious user-submitted content can lead to modification of dynamically-determined object attributes and result in triggering deletion of an arbitrary directory in the file system, if it is writable for the web server. It can also trigger message submission via email using the identity of the web site (mail relay). Another insecure deserialization vulnerability is required to actually exploit mentioned aspects. This has been fixed in 9.5.17 and 10.4.2.
CVE-2019-9061 1 Cmsmadesimple 1 Cms Made Simple 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in CMS Made Simple 2.2.8. In the module ModuleManager (in the file action.installmodule.php), it is possible to reach an unserialize call with untrusted input and achieve authenticated object injection by using the "install module" feature.
CVE-2019-9058 1 Cmsmadesimple 1 Cms Made Simple 2024-11-21 6.5 MEDIUM 7.2 HIGH
An issue was discovered in CMS Made Simple 2.2.8. In the administrator page admin/changegroupperm.php, it is possible to send a crafted value in the sel_groups parameter that leads to authenticated object injection.
CVE-2019-19919 2 Handlebars.js Project, Tenable 2 Handlebars.js, Tenable.sc 2024-11-21 7.5 HIGH 9.8 CRITICAL
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.