2024-05-16 18:03:30 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2024-34273",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2024-05-16T16:15:08.600",
|
2024-05-17 20:03:31 +00:00
|
|
|
"lastModified": "2024-05-17T18:36:31.297",
|
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2024-07-14 02:06:08 +00:00
|
|
|
"cveTags": [],
|
2024-05-16 18:03:30 +00:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "njwt up to v0.4.0 was discovered to contain a prototype pollution in the Parser.prototype.parse method."
|
2024-05-26 02:03:22 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"lang": "es",
|
|
|
|
"value": " Se descubri\u00f3 que njwt hasta v0.4.0 conten\u00eda una contaminaci\u00f3n de prototipo en el m\u00e9todo Parser.prototype.parse."
|
2024-05-16 18:03:30 +00:00
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|