{ "id": "CVE-2024-24293", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.193", "lastModified": "2024-05-20T19:34:58.277", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Prototype Pollution issue in MiguelCastillo @bit/loader v.10.0.3 allows an attacker to execute arbitrary code via the M function e argument in index.js." }, { "lang": "es", "value": " Un problema de contaminaci\u00f3n de prototipo en MiguelCastillo @bit/loader v.10.0.3 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n M y el argumento en index.js." } ], "metrics": {}, "references": [ { "url": "https://gist.github.com/tariqhawis/986fb1c9da6be526fb2656ba8d194b7f", "source": "cve@mitre.org" } ] }