Prototype pollution vulnerability in MrSwitch hello.js version 1.18.6, allows remote attackers to execute arbitrary code via hello.utils.extend function.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2286 | Prototype pollution vulnerability in MrSwitch hello.js version 1.18.6, allows remote attackers to execute arbitrary code via hello.utils.extend function. |
Github GHSA |
GHSA-g3vf-47fv-8f3c | MrSwitch hello.js vulnerable to prototype pollution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/MrSwitch/hello.js/issues/634 |
|
History
Wed, 09 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-09T17:48:29.673Z
Reserved: 2021-02-01T00:00:00
Link: CVE-2021-26505
Updated: 2024-08-03T20:26:25.403Z
Status : Modified
Published: 2023-08-11T14:15:12.257
Modified: 2024-11-21T05:56:25.960
Link: CVE-2021-26505
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA