You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Mithril before 2.0.2 is vulnerable to prototype pollution. The function parseQueryString() may allow a malicious user to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects.
WS-2019-0266 - High Severity Vulnerability
A JavaScript Framework for Building Brilliant Applications
Library home page: https://github.com/lhorie/mithril.js.git
Found in HEAD commit: d66b80275a59d3fb83b0de19b26dfa19cd115737
Found in base branch: next
Mithril before 2.0.2 is vulnerable to prototype pollution. The function parseQueryString() may allow a malicious user to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects.
Publish Date: 2019-07-27
URL: WS-2019-0266
Base Score Metrics not available
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1094
Release Date: 2019-09-25
Fix Resolution: 2.0.3
The text was updated successfully, but these errors were encountered: