Description
Prototype pollution vulnerability in MrSwitch hello.js version 1.18.6, allows remote attackers to execute arbitrary code via hello.utils.extend function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2286 | Prototype pollution vulnerability in MrSwitch hello.js version 1.18.6, allows remote attackers to execute arbitrary code via hello.utils.extend function. |
Github GHSA |
GHSA-g3vf-47fv-8f3c | MrSwitch hello.js vulnerable to prototype pollution |
References
| Link | Providers |
|---|---|
| https://github.com/MrSwitch/hello.js/issues/634 |
|
History
Wed, 09 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-09T17:48:29.673Z
Reserved: 2021-02-01T00:00:00.000Z
Link: CVE-2021-26505
Updated: 2024-08-03T20:26:25.403Z
Status : Modified
Published: 2023-08-11T14:15:12.257
Modified: 2024-11-21T05:56:25.960
Link: CVE-2021-26505
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA