CVE-2021-4264

CVSS V2 None CVSS V3 None
Description
A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464.
Overview
  • CVE ID
  • CVE-2021-4264
  • Assigner
  • cna@vuldb.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-12-21T19:15:12
  • Last Modified Date
  • 2022-12-28T18:48:46
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:linkedin:dustjs:*:*:*:*:*:*:*:* 1 OR 3.0.0
History
Created Old Value New Value Data Type Notes
2022-12-21 20:16:15 Added to TrackCVE
2022-12-21 20:16:16 Weakness Enumeration new
2022-12-22 19:15:43 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-25 20:15:47 2022-12-25T20:15:25 CVE Modified Date updated
2022-12-25 20:15:48 A vulnerability was found in LinkedIn dustjs 3.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.1 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. Description updated
2022-12-25 20:15:49 References updated
2022-12-25 20:15:49 CVSS V3 information new
2022-12-28 19:14:48 2022-12-28T18:48:46 CVE Modified Date updated
2022-12-28 19:14:48 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-28 19:14:51 CPE Information updated
2022-12-28 19:14:51 CVSS V3 information new