CVE-2024-57077
Published Feb 5, 2025
Last updated 9 days ago
- Description
- The latest version of utils-extend (1.0.8) is vulnerable to Prototype Pollution through the entry function(s) lib.extend. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-1321
- Hype score
- Not currently trending