First published: Tue Mar 10 2020(Updated: )
Dojo dojox could allow a remote attacker to inject arbitrary code on the system, caused by a prototype pollution flaw. By injecting other values, an attacker could exploit this vulnerability to overwrite, or pollute, a JavaScript application object prototype of the base object.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Dojox | <1.11.10 | |
Linuxfoundation Dojox | >=1.12.0<1.12.8 | |
Linuxfoundation Dojox | >=1.13.0<1.13.7 | |
Linuxfoundation Dojox | >=1.14.0<1.14.6 | |
Linuxfoundation Dojox | >=1.15.0<1.15.3 | |
Linuxfoundation Dojox | >=1.16.0<1.16.2 | |
IBM Financial Transaction Manager for Corporate Payment Services for Multi-Platform | <=3.2.0-3.2.9 | |
IBM Financial Transaction Manager for Digital Payments for Multi-Platform | <=3.2.0-3.2.9 | |
IBM Financial Transaction Manager for High Value Payments for Multi-Platform | <=3.2.0-3.2.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.