2025-02-18 21:04:14 +00:00

25 lines
1.2 KiB
JSON

{
"id": "CVE-2024-57077",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-05T22:15:31.997",
"lastModified": "2025-02-18T19:15:20.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The latest version of utils-extend (1.0.8) is vulnerable to Prototype Pollution through the entry function(s) lib.extend. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence."
},
{
"lang": "es",
"value": "La \u00faltima versi\u00f3n de utils-extend (1.0.8) es vulnerable a la contaminaci\u00f3n de prototipos a trav\u00e9s de las funciones de entrada lib.extend. Un atacante puede proporcionar un payload con el definidor Object.prototype para introducir o modificar propiedades dentro de la cadena de prototipos global, lo que provoca una denegaci\u00f3n de servicio (DoS) como consecuencia m\u00ednima."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/tariqhawis/64bac50f8c2706e6880e45d50a507114",
"source": "cve@mitre.org"
}
]
}