Vulnerability Description
Prototype pollution vulnerability in ‘just-safe-set’ versions 1.0.0 through 2.2.1 allows an attacker to cause a denial of service and may lead to remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Just-Safe-Set Project | Just-Safe-Set | >= 1.0.0, <= 2.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/angus-c/just/commit/dd57a476f4bb9d78c6f60741898dc04c71d2eb53PatchThird Party Advisory
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952ExploitThird Party Advisory
- https://github.com/angus-c/just/commit/dd57a476f4bb9d78c6f60741898dc04c71d2eb53PatchThird Party Advisory
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952ExploitThird Party Advisory
FAQ
What is CVE-2021-25952?
CVE-2021-25952 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Prototype pollution vulnerability in ‘just-safe-set’ versions 1.0.0 through 2.2.1 allows an attacker to cause a denial of service and may lead to remote code execution.
How severe is CVE-2021-25952?
CVE-2021-25952 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-25952?
Check the references section above for vendor advisories and patch information. Affected products include: Just-Safe-Set Project Just-Safe-Set.