CVE-2024-21529
ADVISORY - githubSummary
Versions of the package dset before 3.1.4 are vulnerable to Prototype Pollution via the dset function due improper user input sanitization. This vulnerability allows the attacker to inject malicious object property using the built-in Object property proto, which is recursively assigned to all the objects in the program.
EPSS Score: 0.00043 (0.103)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
ADVISORY - github
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
ADVISORY - gitlab
ADVISORY - redhat
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
NIST
CREATED
UPDATED
ADVISORY IDCVE-2024-21529
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
GitHub
CREATED
UPDATED
ADVISORY IDGHSA-f6v4-cf5j-vf3w
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
Red Hat
CREATED
UPDATED
ADVISORY IDCVE-2024-21529
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)