Description
Prototype pollution vulnerability via .parse() in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
Recommendation
Update the plist package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.0.5
- Patched version(s): 3.0.5
References
Related Issues
- thlorenz browserify-shim vulnerable to prototype pollution (GHSA-cfgr-75jx-h88g) - CVE-2022-37623
- Improper calculations in ECC implementation can trigger a Denial-of-Service (DoS) - CVE-2023-25653
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- Denial of Service (DoS) vulnerability in RSSHub - CVE-2022-31110
- Tags:
- npm
- plist
Anything's wrong? Let us know Last updated on November 29, 2023